Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-3596
Vulnerability from cvelistv5
Published
2024-07-09 12:02
Modified
2024-08-29 14:32
Severity ?
EPSS score ?
Summary
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ietf:rfc:2865:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "rfc", "vendor": "ietf", "versions": [ { "status": "affected", "version": "2865" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-3596", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-11T03:55:37.141738Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-24T20:18:28.202Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-29T14:32:14.851Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://security.netapp.com/advisory/ntap-20240822-0001/" }, { "url": "https://today.ucsd.edu/story/computer-scientists-discover-vulnerabilities-in-a-popular-security-protocol" }, { "tags": [ "x_transferred" ], "url": "https://datatracker.ietf.org/doc/html/rfc2865" }, { "tags": [ "x_transferred" ], "url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/" }, { "tags": [ "x_transferred" ], "url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf" }, { "tags": [ "x_transferred" ], "url": "https://www.blastradius.fail/" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/07/09/4" }, { "tags": [ "x_transferred" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014" } ], "title": "CVE Program Container", "x_generator": { "engine": "ADPogram 0.0.1" } } ], "cna": { "affected": [ { "product": "RFC", "vendor": "IETF", "versions": [ { "status": "affected", "version": "2865" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Thanks to Sharon Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl who researched and reported this vulnerability" } ], "descriptions": [ { "lang": "en", "value": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-328: Use of Weak Hash", "lang": "en" } ] }, { "descriptions": [ { "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en" } ] }, { "descriptions": [ { "description": "CWE-924 Improper Enforcement of Message Integrity During Transmission in a Communication Channel", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-09T14:08:23.145Z", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "url": "https://datatracker.ietf.org/doc/html/rfc2865" }, { "url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/" }, { "url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf" }, { "url": "https://www.blastradius.fail/" }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/09/4" }, { "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014" } ], "source": { "discovery": "EXTERNAL" }, "title": "RADIUS Protocol under RFC2865 is vulnerable to forgery attacks.", "x_generator": { "engine": "VINCE 3.0.4", "env": "prod", "origin": "https://cveawg.mitre.org/api/cve/CVE-2024-3596" } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2024-3596", "datePublished": "2024-07-09T12:02:53.001Z", "dateReserved": "2024-04-10T15:09:45.391Z", "dateUpdated": "2024-08-29T14:32:14.851Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-3596\",\"sourceIdentifier\":\"cret@cert.org\",\"published\":\"2024-07-09T12:15:20.700\",\"lastModified\":\"2024-11-21T09:29:57.157\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.\"},{\"lang\":\"es\",\"value\":\"El protocolo RADIUS seg\u00fan RFC 2865 es susceptible a ataques de falsificaci\u00f3n por parte de un atacante local que puede modificar cualquier respuesta v\u00e1lida (acceso-aceptaci\u00f3n, acceso-rechazo o acceso-desaf\u00edo) a cualquier otra respuesta utilizando un ataque de colisi\u00f3n de prefijo elegido contra la firma del autenticador de respuesta MD5. .\"}],\"metrics\":{},\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2024/07/09/4\",\"source\":\"cret@cert.org\"},{\"url\":\"https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/\",\"source\":\"cret@cert.org\"},{\"url\":\"https://datatracker.ietf.org/doc/html/rfc2865\",\"source\":\"cret@cert.org\"},{\"url\":\"https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf\",\"source\":\"cret@cert.org\"},{\"url\":\"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.blastradius.fail/\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/07/09/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://datatracker.ietf.org/doc/html/rfc2865\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20240822-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://today.ucsd.edu/story/computer-scientists-discover-vulnerabilities-in-a-popular-security-protocol\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.blastradius.fail/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2024_8860
Vulnerability from csaf_redhat
Published
2024-11-05 01:54
Modified
2024-11-13 16:38
Summary
Red Hat Security Advisory: krb5 security update
Notes
Topic
An update for krb5 is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8860", "url": "https://access.redhat.com/errata/RHSA-2024:8860" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "external", "summary": "RHEL-50253", "url": "https://issues.redhat.com/browse/RHEL-50253" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8860.json" } ], "title": "Red Hat Security Advisory: krb5 security update", "tracking": { "current_release_date": "2024-11-13T16:38:24+00:00", "generator": { "date": "2024-11-13T16:38:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2024:8860", "initial_release_date": "2024-11-05T01:54:00+00:00", "revision_history": [ { "date": "2024-11-05T01:54:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-05T01:54:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T16:38:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "krb5-0:1.18.2-30.el8_10.src", "product": { "name": "krb5-0:1.18.2-30.el8_10.src", "product_id": "krb5-0:1.18.2-30.el8_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5@1.18.2-30.el8_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.18.2-30.el8_10.aarch64", "product": { "name": "krb5-devel-0:1.18.2-30.el8_10.aarch64", "product_id": "krb5-devel-0:1.18.2-30.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-30.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.18.2-30.el8_10.aarch64", "product": { "name": "krb5-libs-0:1.18.2-30.el8_10.aarch64", "product_id": "krb5-libs-0:1.18.2-30.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-30.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.18.2-30.el8_10.aarch64", "product": { "name": "krb5-pkinit-0:1.18.2-30.el8_10.aarch64", "product_id": "krb5-pkinit-0:1.18.2-30.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-30.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-0:1.18.2-30.el8_10.aarch64", "product": { "name": "krb5-server-0:1.18.2-30.el8_10.aarch64", "product_id": "krb5-server-0:1.18.2-30.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.18.2-30.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.18.2-30.el8_10.aarch64", "product": { "name": "krb5-server-ldap-0:1.18.2-30.el8_10.aarch64", "product_id": "krb5-server-ldap-0:1.18.2-30.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-30.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.18.2-30.el8_10.aarch64", "product": { "name": "krb5-workstation-0:1.18.2-30.el8_10.aarch64", "product_id": "krb5-workstation-0:1.18.2-30.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-30.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "libkadm5-0:1.18.2-30.el8_10.aarch64", "product": { "name": "libkadm5-0:1.18.2-30.el8_10.aarch64", "product_id": "libkadm5-0:1.18.2-30.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.18.2-30.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.18.2-30.el8_10.aarch64", "product": { "name": "krb5-debugsource-0:1.18.2-30.el8_10.aarch64", "product_id": "krb5-debugsource-0:1.18.2-30.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-30.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.18.2-30.el8_10.aarch64", "product": { "name": "krb5-debuginfo-0:1.18.2-30.el8_10.aarch64", "product_id": "krb5-debuginfo-0:1.18.2-30.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-30.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64", "product": { "name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64", "product_id": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-30.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64", "product": { "name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64", "product_id": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-30.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64", "product": { "name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64", "product_id": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-30.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64", "product": { "name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64", "product_id": "krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-30.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64", "product": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64", "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-30.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64", "product": { "name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64", "product_id": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-30.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64", "product": { "name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64", "product_id": "libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-30.el8_10?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.18.2-30.el8_10.ppc64le", "product": { "name": "krb5-devel-0:1.18.2-30.el8_10.ppc64le", "product_id": "krb5-devel-0:1.18.2-30.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-30.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-libs-0:1.18.2-30.el8_10.ppc64le", "product": { "name": "krb5-libs-0:1.18.2-30.el8_10.ppc64le", "product_id": "krb5-libs-0:1.18.2-30.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-30.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.18.2-30.el8_10.ppc64le", "product": { "name": "krb5-pkinit-0:1.18.2-30.el8_10.ppc64le", "product_id": "krb5-pkinit-0:1.18.2-30.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-30.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-0:1.18.2-30.el8_10.ppc64le", "product": { "name": "krb5-server-0:1.18.2-30.el8_10.ppc64le", "product_id": "krb5-server-0:1.18.2-30.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.18.2-30.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le", "product": { "name": "krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le", "product_id": "krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-30.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.18.2-30.el8_10.ppc64le", "product": { "name": "krb5-workstation-0:1.18.2-30.el8_10.ppc64le", "product_id": "krb5-workstation-0:1.18.2-30.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-30.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "libkadm5-0:1.18.2-30.el8_10.ppc64le", "product": { "name": "libkadm5-0:1.18.2-30.el8_10.ppc64le", "product_id": "libkadm5-0:1.18.2-30.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.18.2-30.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.18.2-30.el8_10.ppc64le", "product": { "name": "krb5-debugsource-0:1.18.2-30.el8_10.ppc64le", "product_id": "krb5-debugsource-0:1.18.2-30.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-30.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le", "product": { "name": "krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le", "product_id": "krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-30.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le", "product": { "name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le", "product_id": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-30.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le", "product": { "name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le", "product_id": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-30.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le", "product": { "name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le", "product_id": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-30.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le", "product": { "name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le", "product_id": "krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-30.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le", "product": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le", "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-30.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le", "product": { "name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le", "product_id": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-30.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le", "product": { "name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le", "product_id": "libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-30.el8_10?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.18.2-30.el8_10.i686", "product": { "name": "krb5-devel-0:1.18.2-30.el8_10.i686", "product_id": "krb5-devel-0:1.18.2-30.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-30.el8_10?arch=i686" } } }, { "category": "product_version", "name": "krb5-libs-0:1.18.2-30.el8_10.i686", "product": { "name": "krb5-libs-0:1.18.2-30.el8_10.i686", "product_id": "krb5-libs-0:1.18.2-30.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-30.el8_10?arch=i686" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.18.2-30.el8_10.i686", "product": { "name": "krb5-pkinit-0:1.18.2-30.el8_10.i686", "product_id": "krb5-pkinit-0:1.18.2-30.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-30.el8_10?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-0:1.18.2-30.el8_10.i686", "product": { "name": "krb5-server-0:1.18.2-30.el8_10.i686", "product_id": "krb5-server-0:1.18.2-30.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.18.2-30.el8_10?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.18.2-30.el8_10.i686", "product": { "name": "krb5-server-ldap-0:1.18.2-30.el8_10.i686", "product_id": "krb5-server-ldap-0:1.18.2-30.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-30.el8_10?arch=i686" } } }, { "category": "product_version", "name": "libkadm5-0:1.18.2-30.el8_10.i686", "product": { "name": "libkadm5-0:1.18.2-30.el8_10.i686", "product_id": "libkadm5-0:1.18.2-30.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.18.2-30.el8_10?arch=i686" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.18.2-30.el8_10.i686", "product": { "name": "krb5-debugsource-0:1.18.2-30.el8_10.i686", "product_id": "krb5-debugsource-0:1.18.2-30.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-30.el8_10?arch=i686" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.18.2-30.el8_10.i686", "product": { "name": "krb5-debuginfo-0:1.18.2-30.el8_10.i686", "product_id": "krb5-debuginfo-0:1.18.2-30.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-30.el8_10?arch=i686" } } }, { "category": "product_version", "name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686", "product": { "name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686", "product_id": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-30.el8_10?arch=i686" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686", "product": { "name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686", "product_id": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-30.el8_10?arch=i686" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686", "product": { "name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686", "product_id": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-30.el8_10?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.i686", "product": { "name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.i686", "product_id": "krb5-server-debuginfo-0:1.18.2-30.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-30.el8_10?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686", "product": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686", "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-30.el8_10?arch=i686" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686", "product": { "name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686", "product_id": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-30.el8_10?arch=i686" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.i686", "product": { "name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.i686", "product_id": "libkadm5-debuginfo-0:1.18.2-30.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-30.el8_10?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.18.2-30.el8_10.x86_64", "product": { "name": "krb5-devel-0:1.18.2-30.el8_10.x86_64", "product_id": "krb5-devel-0:1.18.2-30.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-30.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.18.2-30.el8_10.x86_64", "product": { "name": "krb5-libs-0:1.18.2-30.el8_10.x86_64", "product_id": "krb5-libs-0:1.18.2-30.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-30.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.18.2-30.el8_10.x86_64", "product": { "name": "krb5-pkinit-0:1.18.2-30.el8_10.x86_64", "product_id": "krb5-pkinit-0:1.18.2-30.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-30.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-0:1.18.2-30.el8_10.x86_64", "product": { "name": "krb5-server-0:1.18.2-30.el8_10.x86_64", "product_id": "krb5-server-0:1.18.2-30.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.18.2-30.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.18.2-30.el8_10.x86_64", "product": { "name": "krb5-server-ldap-0:1.18.2-30.el8_10.x86_64", "product_id": "krb5-server-ldap-0:1.18.2-30.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-30.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.18.2-30.el8_10.x86_64", "product": { "name": "krb5-workstation-0:1.18.2-30.el8_10.x86_64", "product_id": "krb5-workstation-0:1.18.2-30.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-30.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "libkadm5-0:1.18.2-30.el8_10.x86_64", "product": { "name": "libkadm5-0:1.18.2-30.el8_10.x86_64", "product_id": "libkadm5-0:1.18.2-30.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.18.2-30.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.18.2-30.el8_10.x86_64", "product": { "name": "krb5-debugsource-0:1.18.2-30.el8_10.x86_64", "product_id": "krb5-debugsource-0:1.18.2-30.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-30.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.18.2-30.el8_10.x86_64", "product": { "name": "krb5-debuginfo-0:1.18.2-30.el8_10.x86_64", "product_id": "krb5-debuginfo-0:1.18.2-30.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-30.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64", "product": { "name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64", "product_id": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-30.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64", "product": { "name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64", "product_id": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-30.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64", "product": { "name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64", "product_id": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-30.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64", "product": { "name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64", "product_id": "krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-30.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64", "product": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64", "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-30.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64", "product": { "name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64", "product_id": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-30.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64", "product": { "name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64", "product_id": "libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-30.el8_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.18.2-30.el8_10.s390x", "product": { "name": "krb5-devel-0:1.18.2-30.el8_10.s390x", "product_id": "krb5-devel-0:1.18.2-30.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-30.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "krb5-libs-0:1.18.2-30.el8_10.s390x", "product": { "name": "krb5-libs-0:1.18.2-30.el8_10.s390x", "product_id": "krb5-libs-0:1.18.2-30.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-30.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.18.2-30.el8_10.s390x", "product": { "name": "krb5-pkinit-0:1.18.2-30.el8_10.s390x", "product_id": "krb5-pkinit-0:1.18.2-30.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-30.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-0:1.18.2-30.el8_10.s390x", "product": { "name": "krb5-server-0:1.18.2-30.el8_10.s390x", "product_id": "krb5-server-0:1.18.2-30.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.18.2-30.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.18.2-30.el8_10.s390x", "product": { "name": "krb5-server-ldap-0:1.18.2-30.el8_10.s390x", "product_id": "krb5-server-ldap-0:1.18.2-30.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-30.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.18.2-30.el8_10.s390x", "product": { "name": "krb5-workstation-0:1.18.2-30.el8_10.s390x", "product_id": "krb5-workstation-0:1.18.2-30.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-30.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "libkadm5-0:1.18.2-30.el8_10.s390x", "product": { "name": "libkadm5-0:1.18.2-30.el8_10.s390x", "product_id": "libkadm5-0:1.18.2-30.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.18.2-30.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.18.2-30.el8_10.s390x", "product": { "name": "krb5-debugsource-0:1.18.2-30.el8_10.s390x", "product_id": "krb5-debugsource-0:1.18.2-30.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-30.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.18.2-30.el8_10.s390x", "product": { "name": "krb5-debuginfo-0:1.18.2-30.el8_10.s390x", "product_id": "krb5-debuginfo-0:1.18.2-30.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-30.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x", "product": { "name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x", "product_id": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-30.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x", "product": { "name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x", "product_id": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-30.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x", "product": { "name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x", "product_id": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-30.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x", "product": { "name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x", "product_id": "krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-30.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x", "product": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x", "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-30.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x", "product": { "name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x", "product_id": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-30.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x", "product": { "name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x", "product_id": "libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-30.el8_10?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.18.2-30.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-30.el8_10.src" }, "product_reference": "krb5-0:1.18.2-30.el8_10.src", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.aarch64" }, "product_reference": "krb5-debuginfo-0:1.18.2-30.el8_10.aarch64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.i686" }, "product_reference": "krb5-debuginfo-0:1.18.2-30.el8_10.i686", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le" }, "product_reference": "krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.s390x" }, "product_reference": "krb5-debuginfo-0:1.18.2-30.el8_10.s390x", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.x86_64" }, "product_reference": "krb5-debuginfo-0:1.18.2-30.el8_10.x86_64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.aarch64" }, "product_reference": "krb5-debugsource-0:1.18.2-30.el8_10.aarch64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.i686" }, "product_reference": "krb5-debugsource-0:1.18.2-30.el8_10.i686", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.ppc64le" }, "product_reference": "krb5-debugsource-0:1.18.2-30.el8_10.ppc64le", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.s390x" }, "product_reference": "krb5-debugsource-0:1.18.2-30.el8_10.s390x", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.x86_64" }, "product_reference": "krb5-debugsource-0:1.18.2-30.el8_10.x86_64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.aarch64" }, "product_reference": "krb5-devel-0:1.18.2-30.el8_10.aarch64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.i686" }, "product_reference": "krb5-devel-0:1.18.2-30.el8_10.i686", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.ppc64le" }, "product_reference": "krb5-devel-0:1.18.2-30.el8_10.ppc64le", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.s390x" }, "product_reference": "krb5-devel-0:1.18.2-30.el8_10.s390x", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.x86_64" }, "product_reference": "krb5-devel-0:1.18.2-30.el8_10.x86_64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.aarch64" }, "product_reference": "krb5-libs-0:1.18.2-30.el8_10.aarch64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.i686" }, "product_reference": "krb5-libs-0:1.18.2-30.el8_10.i686", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.ppc64le" }, "product_reference": "krb5-libs-0:1.18.2-30.el8_10.ppc64le", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.s390x" }, "product_reference": "krb5-libs-0:1.18.2-30.el8_10.s390x", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.x86_64" }, "product_reference": "krb5-libs-0:1.18.2-30.el8_10.x86_64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.aarch64" }, "product_reference": "krb5-pkinit-0:1.18.2-30.el8_10.aarch64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.i686" }, "product_reference": "krb5-pkinit-0:1.18.2-30.el8_10.i686", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.ppc64le" }, "product_reference": "krb5-pkinit-0:1.18.2-30.el8_10.ppc64le", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.s390x" }, "product_reference": "krb5-pkinit-0:1.18.2-30.el8_10.s390x", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.x86_64" }, "product_reference": "krb5-pkinit-0:1.18.2-30.el8_10.x86_64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.aarch64" }, "product_reference": "krb5-server-0:1.18.2-30.el8_10.aarch64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.i686" }, "product_reference": "krb5-server-0:1.18.2-30.el8_10.i686", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.ppc64le" }, "product_reference": "krb5-server-0:1.18.2-30.el8_10.ppc64le", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.s390x" }, "product_reference": "krb5-server-0:1.18.2-30.el8_10.s390x", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.x86_64" }, "product_reference": "krb5-server-0:1.18.2-30.el8_10.x86_64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.i686" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-30.el8_10.i686", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.aarch64" }, "product_reference": "krb5-server-ldap-0:1.18.2-30.el8_10.aarch64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.i686" }, "product_reference": "krb5-server-ldap-0:1.18.2-30.el8_10.i686", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le" }, "product_reference": "krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.s390x" }, "product_reference": "krb5-server-ldap-0:1.18.2-30.el8_10.s390x", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.x86_64" }, "product_reference": "krb5-server-ldap-0:1.18.2-30.el8_10.x86_64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.aarch64" }, "product_reference": "krb5-workstation-0:1.18.2-30.el8_10.aarch64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.ppc64le" }, "product_reference": "krb5-workstation-0:1.18.2-30.el8_10.ppc64le", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.s390x" }, "product_reference": "krb5-workstation-0:1.18.2-30.el8_10.s390x", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.x86_64" }, "product_reference": "krb5-workstation-0:1.18.2-30.el8_10.x86_64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.aarch64" }, "product_reference": "libkadm5-0:1.18.2-30.el8_10.aarch64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.i686" }, "product_reference": "libkadm5-0:1.18.2-30.el8_10.i686", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.ppc64le" }, "product_reference": "libkadm5-0:1.18.2-30.el8_10.ppc64le", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.s390x" }, "product_reference": "libkadm5-0:1.18.2-30.el8_10.s390x", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.x86_64" }, "product_reference": "libkadm5-0:1.18.2-30.el8_10.x86_64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.i686" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-30.el8_10.i686", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "discovery_date": "2024-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2263240" } ], "notes": [ { "category": "description", "text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.", "title": "Vulnerability description" }, { "category": "summary", "text": "freeradius: forgery attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-30.el8_10.src", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-3596" }, { "category": "external", "summary": "RHBZ#2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/", "url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/html/rfc2865", "url": "https://datatracker.ietf.org/doc/html/rfc2865" }, { "category": "external", "summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf", "url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf" }, { "category": "external", "summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt", "url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt" }, { "category": "external", "summary": "https://www.blastradius.fail/", "url": "https://www.blastradius.fail/" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/456537", "url": "https://www.kb.cert.org/vuls/id/456537" } ], "release_date": "2024-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-05T01:54:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-30.el8_10.src", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8860" }, { "category": "workaround", "details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.", "product_ids": [ "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-30.el8_10.src", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-30.el8_10.src", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-30.el8_10.x86_64", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.aarch64", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.i686", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.ppc64le", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.s390x", "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-30.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freeradius: forgery attack" } ] }
rhsa-2024_4913
Vulnerability from csaf_redhat
Published
2024-07-30 08:52
Modified
2024-11-13 16:38
Summary
Red Hat Security Advisory: freeradius:3.0 security update
Notes
Topic
An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4913", "url": "https://access.redhat.com/errata/RHSA-2024:4913" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4913.json" } ], "title": "Red Hat Security Advisory: freeradius:3.0 security update", "tracking": { "current_release_date": "2024-11-13T16:38:24+00:00", "generator": { "date": "2024-11-13T16:38:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2024:4913", "initial_release_date": "2024-07-30T08:52:26+00:00", "revision_history": [ { "date": "2024-07-30T08:52:26+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-30T08:52:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T16:38:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "freeradius:3.0:8020020240726095340:ce27ea5e", "product": { "name": "freeradius:3.0:8020020240726095340:ce27ea5e", "product_id": "freeradius:3.0:8020020240726095340:ce27ea5e", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/freeradius@3.0:8020020240726095340:ce27ea5e" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src", "product": { "name": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src", "product_id": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product": { "name": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_id": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product": { "name": "freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_id": "freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product": { "name": "freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_id": "freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product": { "name": "freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_id": "freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product": { "name": "freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_id": "freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product": { "name": "freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_id": "freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_id": "freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product": { "name": "freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_id": "freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_id": "freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product": { "name": "freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_id": "freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_id": "freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product": { "name": "freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_id": "freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product": { "name": "freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_id": "freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product": { "name": "freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_id": "freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_id": "freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product": { "name": "freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_id": "freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product": { "name": "freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_id": "freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product": { "name": "freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_id": "freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_id": "freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product": { "name": "freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_id": "freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product": { "name": "freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_id": "freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product": { "name": "freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_id": "freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-1.module%2Bel8.2.0%2B22148%2Bb45f7ef2.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" }, "product_reference": "freeradius:3.0:8020020240726095340:ce27ea5e", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src" }, "product_reference": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" }, "product_reference": "freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" }, "product_reference": "freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" }, "product_reference": "freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" }, "product_reference": "freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" }, "product_reference": "freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" }, "product_reference": "freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" }, "product_reference": "freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" }, "product_reference": "freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" }, "product_reference": "freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" }, "product_reference": "freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" }, "product_reference": "freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" }, "product_reference": "freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" }, "product_reference": "freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" }, "product_reference": "freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64 as a component of freeradius:3.0:8020020240726095340:ce27ea5e as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "discovery_date": "2024-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2263240" } ], "notes": [ { "category": "description", "text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.", "title": "Vulnerability description" }, { "category": "summary", "text": "freeradius: forgery attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-3596" }, { "category": "external", "summary": "RHBZ#2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/", "url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/html/rfc2865", "url": "https://datatracker.ietf.org/doc/html/rfc2865" }, { "category": "external", "summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf", "url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf" }, { "category": "external", "summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt", "url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt" }, { "category": "external", "summary": "https://www.blastradius.fail/", "url": "https://www.blastradius.fail/" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/456537", "url": "https://www.kb.cert.org/vuls/id/456537" } ], "release_date": "2024-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-30T08:52:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4913" }, { "category": "workaround", "details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.", "product_ids": [ "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.src", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-debugsource-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-devel-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-doc-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-krb5-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-krb5-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-ldap-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-ldap-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-mysql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-mysql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-perl-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-perl-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-postgresql-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-postgresql-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-rest-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-rest-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-sqlite-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-sqlite-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-unixODBC-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-unixODBC-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-utils-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64", "AppStream-8.2.0.Z.AUS:freeradius:3.0:8020020240726095340:ce27ea5e:freeradius-utils-debuginfo-0:3.0.20-1.module+el8.2.0+22148+b45f7ef2.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freeradius: forgery attack" } ] }
rhsa-2024_4912
Vulnerability from csaf_redhat
Published
2024-07-30 08:53
Modified
2024-12-18 00:31
Summary
Red Hat Security Advisory: freeradius security update
Notes
Topic
An update for freeradius is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for freeradius is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4912", "url": "https://access.redhat.com/errata/RHSA-2024:4912" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4912.json" } ], "title": "Red Hat Security Advisory: freeradius security update", "tracking": { "current_release_date": "2024-12-18T00:31:09+00:00", "generator": { "date": "2024-12-18T00:31:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:4912", "initial_release_date": "2024-07-30T08:53:46+00:00", "revision_history": [ { "date": "2024-07-30T08:53:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-30T08:53:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:31:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.21-26.el9_0.1.src", "product": { "name": "freeradius-0:3.0.21-26.el9_0.1.src", "product_id": "freeradius-0:3.0.21-26.el9_0.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.21-26.el9_0.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.21-26.el9_0.1.aarch64", "product": { "name": "freeradius-0:3.0.21-26.el9_0.1.aarch64", "product_id": "freeradius-0:3.0.21-26.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.21-26.el9_0.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.21-26.el9_0.1.aarch64", "product": { "name": "freeradius-devel-0:3.0.21-26.el9_0.1.aarch64", "product_id": "freeradius-devel-0:3.0.21-26.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-26.el9_0.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.21-26.el9_0.1.aarch64", "product": { "name": "freeradius-doc-0:3.0.21-26.el9_0.1.aarch64", "product_id": "freeradius-doc-0:3.0.21-26.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-26.el9_0.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64", "product": { "name": "freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64", "product_id": "freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-26.el9_0.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64", "product": { "name": "freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64", "product_id": "freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-26.el9_0.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.21-26.el9_0.1.aarch64", "product": { "name": "freeradius-utils-0:3.0.21-26.el9_0.1.aarch64", "product_id": "freeradius-utils-0:3.0.21-26.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-26.el9_0.1?arch=aarch64" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.21-26.el9_0.1.aarch64", "product": { "name": "python3-freeradius-0:3.0.21-26.el9_0.1.aarch64", "product_id": "python3-freeradius-0:3.0.21-26.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-26.el9_0.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64", "product": { "name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64", "product_id": "freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-26.el9_0.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product": { "name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product_id": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-26.el9_0.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product_id": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-26.el9_0.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product_id": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-26.el9_0.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product_id": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-26.el9_0.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product": { "name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product_id": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-26.el9_0.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product_id": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-26.el9_0.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product": { "name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product_id": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-26.el9_0.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product_id": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-26.el9_0.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-26.el9_0.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product": { "name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product_id": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-26.el9_0.1?arch=aarch64" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product": { "name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product_id": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-26.el9_0.1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.21-26.el9_0.1.ppc64le", "product": { "name": "freeradius-0:3.0.21-26.el9_0.1.ppc64le", "product_id": "freeradius-0:3.0.21-26.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.21-26.el9_0.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le", "product": { "name": "freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le", "product_id": "freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-26.el9_0.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le", "product": { "name": "freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le", "product_id": "freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-26.el9_0.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le", "product": { "name": "freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le", "product_id": "freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-26.el9_0.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le", "product": { "name": "freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le", "product_id": "freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-26.el9_0.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le", "product": { "name": "freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le", "product_id": "freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-26.el9_0.1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le", "product": { "name": "python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le", "product_id": "python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-26.el9_0.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le", "product": { "name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le", "product_id": "freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-26.el9_0.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product": { "name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product_id": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product_id": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product_id": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product_id": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product": { "name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product_id": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product_id": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product": { "name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product_id": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product_id": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product": { "name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product_id": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product": { "name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product_id": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-26.el9_0.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.21-26.el9_0.1.x86_64", "product": { "name": "freeradius-0:3.0.21-26.el9_0.1.x86_64", "product_id": "freeradius-0:3.0.21-26.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.21-26.el9_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.21-26.el9_0.1.x86_64", "product": { "name": "freeradius-devel-0:3.0.21-26.el9_0.1.x86_64", "product_id": "freeradius-devel-0:3.0.21-26.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-26.el9_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.21-26.el9_0.1.x86_64", "product": { "name": "freeradius-doc-0:3.0.21-26.el9_0.1.x86_64", "product_id": "freeradius-doc-0:3.0.21-26.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-26.el9_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64", "product": { "name": "freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64", "product_id": "freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-26.el9_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64", "product": { "name": "freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64", "product_id": "freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-26.el9_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.21-26.el9_0.1.x86_64", "product": { "name": "freeradius-utils-0:3.0.21-26.el9_0.1.x86_64", "product_id": "freeradius-utils-0:3.0.21-26.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-26.el9_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.21-26.el9_0.1.x86_64", "product": { "name": "python3-freeradius-0:3.0.21-26.el9_0.1.x86_64", "product_id": "python3-freeradius-0:3.0.21-26.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-26.el9_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64", "product": { "name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64", "product_id": "freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-26.el9_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product": { "name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product_id": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-26.el9_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product_id": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-26.el9_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product_id": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-26.el9_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product_id": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-26.el9_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product": { "name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product_id": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-26.el9_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product_id": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-26.el9_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product": { "name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product_id": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-26.el9_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product_id": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-26.el9_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-26.el9_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product": { "name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product_id": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-26.el9_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product": { "name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product_id": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-26.el9_0.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.21-26.el9_0.1.s390x", "product": { "name": "freeradius-0:3.0.21-26.el9_0.1.s390x", "product_id": "freeradius-0:3.0.21-26.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.21-26.el9_0.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.21-26.el9_0.1.s390x", "product": { "name": "freeradius-devel-0:3.0.21-26.el9_0.1.s390x", "product_id": "freeradius-devel-0:3.0.21-26.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-26.el9_0.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.21-26.el9_0.1.s390x", "product": { "name": "freeradius-doc-0:3.0.21-26.el9_0.1.s390x", "product_id": "freeradius-doc-0:3.0.21-26.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-26.el9_0.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.21-26.el9_0.1.s390x", "product": { "name": "freeradius-krb5-0:3.0.21-26.el9_0.1.s390x", "product_id": "freeradius-krb5-0:3.0.21-26.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-26.el9_0.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.21-26.el9_0.1.s390x", "product": { "name": "freeradius-ldap-0:3.0.21-26.el9_0.1.s390x", "product_id": "freeradius-ldap-0:3.0.21-26.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-26.el9_0.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.21-26.el9_0.1.s390x", "product": { "name": "freeradius-utils-0:3.0.21-26.el9_0.1.s390x", "product_id": "freeradius-utils-0:3.0.21-26.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-26.el9_0.1?arch=s390x" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.21-26.el9_0.1.s390x", "product": { "name": "python3-freeradius-0:3.0.21-26.el9_0.1.s390x", "product_id": "python3-freeradius-0:3.0.21-26.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-26.el9_0.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x", "product": { "name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x", "product_id": "freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-26.el9_0.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product": { "name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product_id": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-26.el9_0.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product_id": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-26.el9_0.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product_id": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-26.el9_0.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product_id": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-26.el9_0.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product": { "name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product_id": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-26.el9_0.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product_id": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-26.el9_0.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product": { "name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product_id": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-26.el9_0.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product_id": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-26.el9_0.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-26.el9_0.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product": { "name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product_id": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-26.el9_0.1?arch=s390x" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product": { "name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product_id": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-26.el9_0.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.aarch64" }, "product_reference": "freeradius-0:3.0.21-26.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.ppc64le" }, "product_reference": "freeradius-0:3.0.21-26.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.s390x" }, "product_reference": "freeradius-0:3.0.21-26.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-26.el9_0.1.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.src" }, "product_reference": "freeradius-0:3.0.21-26.el9_0.1.src", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.x86_64" }, "product_reference": "freeradius-0:3.0.21-26.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64" }, "product_reference": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le" }, "product_reference": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x" }, "product_reference": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64" }, "product_reference": "freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64" }, "product_reference": "freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le" }, "product_reference": "freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x" }, "product_reference": "freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64" }, "product_reference": "freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.aarch64" }, "product_reference": "freeradius-devel-0:3.0.21-26.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le" }, "product_reference": "freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.s390x" }, "product_reference": "freeradius-devel-0:3.0.21-26.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.x86_64" }, "product_reference": "freeradius-devel-0:3.0.21-26.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.aarch64" }, "product_reference": "freeradius-doc-0:3.0.21-26.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le" }, "product_reference": "freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.s390x" }, "product_reference": "freeradius-doc-0:3.0.21-26.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.x86_64" }, "product_reference": "freeradius-doc-0:3.0.21-26.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64" }, "product_reference": "freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le" }, "product_reference": "freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.s390x" }, "product_reference": "freeradius-krb5-0:3.0.21-26.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64" }, "product_reference": "freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64" }, "product_reference": "freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le" }, "product_reference": "freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.s390x" }, "product_reference": "freeradius-ldap-0:3.0.21-26.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64" }, "product_reference": "freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.aarch64" }, "product_reference": "freeradius-utils-0:3.0.21-26.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le" }, "product_reference": "freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.s390x" }, "product_reference": "freeradius-utils-0:3.0.21-26.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.x86_64" }, "product_reference": "freeradius-utils-0:3.0.21-26.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.aarch64" }, "product_reference": "python3-freeradius-0:3.0.21-26.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le" }, "product_reference": "python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.s390x" }, "product_reference": "python3-freeradius-0:3.0.21-26.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.x86_64" }, "product_reference": "python3-freeradius-0:3.0.21-26.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "discovery_date": "2024-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2263240" } ], "notes": [ { "category": "description", "text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.", "title": "Vulnerability description" }, { "category": "summary", "text": "freeradius: forgery attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.src", "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-3596" }, { "category": "external", "summary": "RHBZ#2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/", "url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/html/rfc2865", "url": "https://datatracker.ietf.org/doc/html/rfc2865" }, { "category": "external", "summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf", "url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf" }, { "category": "external", "summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt", "url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt" }, { "category": "external", "summary": "https://www.blastradius.fail/", "url": "https://www.blastradius.fail/" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/456537", "url": "https://www.kb.cert.org/vuls/id/456537" } ], "release_date": "2024-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-30T08:53:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.src", "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4912" }, { "category": "workaround", "details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.", "product_ids": [ "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.src", "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.src", "AppStream-9.0.0.Z.E4S:freeradius-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-debugsource-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-devel-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-doc-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-krb5-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-krb5-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-ldap-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-ldap-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-mysql-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-perl-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-postgresql-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-rest-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-sqlite-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-unixODBC-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-utils-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:freeradius-utils-debuginfo-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:python3-freeradius-0:3.0.21-26.el9_0.1.x86_64", "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.aarch64", "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.ppc64le", "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.s390x", "AppStream-9.0.0.Z.E4S:python3-freeradius-debuginfo-0:3.0.21-26.el9_0.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freeradius: forgery attack" } ] }
rhsa-2024_8461
Vulnerability from csaf_redhat
Published
2024-10-24 17:57
Modified
2024-11-13 16:38
Summary
Red Hat Security Advisory: krb5 security update
Notes
Topic
An update for krb5 is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for krb5 is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8461", "url": "https://access.redhat.com/errata/RHSA-2024:8461" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8461.json" } ], "title": "Red Hat Security Advisory: krb5 security update", "tracking": { "current_release_date": "2024-11-13T16:38:57+00:00", "generator": { "date": "2024-11-13T16:38:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2024:8461", "initial_release_date": "2024-10-24T17:57:50+00:00", "revision_history": [ { "date": "2024-10-24T17:57:50+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-24T17:57:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T16:38:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:9.2::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64", "product": { "name": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64", "product_id": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64", "product": { "name": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64", "product_id": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64", "product": { "name": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64", "product_id": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-0:1.20.1-9.el9_2.2.aarch64", "product": { "name": "krb5-server-0:1.20.1-9.el9_2.2.aarch64", "product_id": "krb5-server-0:1.20.1-9.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64", "product": { "name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64", "product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64", "product": { "name": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64", "product_id": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.20.1-9.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "libkadm5-0:1.20.1-9.el9_2.2.aarch64", "product": { "name": "libkadm5-0:1.20.1-9.el9_2.2.aarch64", "product_id": "libkadm5-0:1.20.1-9.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64", "product": { "name": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64", "product_id": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "product": { "name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "product": { "name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "product": { "name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "product": { "name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "product": { "name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "product": { "name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "product_id": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.20.1-9.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "product": { "name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le", "product": { "name": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le", "product_id": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le", "product": { "name": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le", "product_id": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le", "product": { "name": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le", "product_id": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le", "product": { "name": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le", "product_id": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le", "product": { "name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le", "product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le", "product": { "name": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le", "product_id": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.20.1-9.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le", "product": { "name": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le", "product_id": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le", "product": { "name": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le", "product_id": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "product": { "name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "product": { "name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "product": { "name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "product": { "name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "product": { "name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "product": { "name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "product_id": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "product": { "name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.20.1-9.el9_2.2.i686", "product": { "name": "krb5-devel-0:1.20.1-9.el9_2.2.i686", "product_id": "krb5-devel-0:1.20.1-9.el9_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-libs-0:1.20.1-9.el9_2.2.i686", "product": { "name": "krb5-libs-0:1.20.1-9.el9_2.2.i686", "product_id": "krb5-libs-0:1.20.1-9.el9_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686", "product": { "name": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686", "product_id": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-0:1.20.1-9.el9_2.2.i686", "product": { "name": "krb5-server-0:1.20.1-9.el9_2.2.i686", "product_id": "krb5-server-0:1.20.1-9.el9_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686", "product": { "name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686", "product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.2?arch=i686" } } }, { "category": "product_version", "name": "libkadm5-0:1.20.1-9.el9_2.2.i686", "product": { "name": "libkadm5-0:1.20.1-9.el9_2.2.i686", "product_id": "libkadm5-0:1.20.1-9.el9_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686", "product": { "name": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686", "product_id": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686", "product": { "name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686", "product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686", "product": { "name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686", "product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686", "product": { "name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686", "product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686", "product": { "name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686", "product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686", "product": { "name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686", "product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.2?arch=i686" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686", "product": { "name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686", "product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.2?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64", "product": { "name": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64", "product_id": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64", "product": { "name": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64", "product_id": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64", "product": { "name": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64", "product_id": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-0:1.20.1-9.el9_2.2.x86_64", "product": { "name": "krb5-server-0:1.20.1-9.el9_2.2.x86_64", "product_id": "krb5-server-0:1.20.1-9.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64", "product": { "name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64", "product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64", "product": { "name": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64", "product_id": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.20.1-9.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "libkadm5-0:1.20.1-9.el9_2.2.x86_64", "product": { "name": "libkadm5-0:1.20.1-9.el9_2.2.x86_64", "product_id": "libkadm5-0:1.20.1-9.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64", "product": { "name": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64", "product_id": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "product": { "name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "product": { "name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "product": { "name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "product": { "name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "product": { "name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "product": { "name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "product_id": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.20.1-9.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "product": { "name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.20.1-9.el9_2.2.s390x", "product": { "name": "krb5-devel-0:1.20.1-9.el9_2.2.s390x", "product_id": "krb5-devel-0:1.20.1-9.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.20.1-9.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-libs-0:1.20.1-9.el9_2.2.s390x", "product": { "name": "krb5-libs-0:1.20.1-9.el9_2.2.s390x", "product_id": "krb5-libs-0:1.20.1-9.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.20.1-9.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x", "product": { "name": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x", "product_id": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.20.1-9.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-0:1.20.1-9.el9_2.2.s390x", "product": { "name": "krb5-server-0:1.20.1-9.el9_2.2.s390x", "product_id": "krb5-server-0:1.20.1-9.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.20.1-9.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x", "product": { "name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x", "product_id": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.20.1-9.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x", "product": { "name": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x", "product_id": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.20.1-9.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "libkadm5-0:1.20.1-9.el9_2.2.s390x", "product": { "name": "libkadm5-0:1.20.1-9.el9_2.2.s390x", "product_id": "libkadm5-0:1.20.1-9.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.20.1-9.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x", "product": { "name": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x", "product_id": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.20.1-9.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "product": { "name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "product_id": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.20.1-9.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x", "product": { "name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x", "product_id": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.20.1-9.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x", "product": { "name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x", "product_id": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.20.1-9.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x", "product": { "name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x", "product_id": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.20.1-9.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x", "product": { "name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x", "product_id": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.20.1-9.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x", "product": { "name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x", "product_id": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.20.1-9.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "product": { "name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "product_id": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.20.1-9.el9_2.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "krb5-0:1.20.1-9.el9_2.2.src", "product": { "name": "krb5-0:1.20.1-9.el9_2.2.src", "product_id": "krb5-0:1.20.1-9.el9_2.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5@1.20.1-9.el9_2.2?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.20.1-9.el9_2.2.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src" }, "product_reference": "krb5-0:1.20.1-9.el9_2.2.src", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-server-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "krb5-server-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-server-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-server-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "libkadm5-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "libkadm5-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "libkadm5-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "libkadm5-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.20.1-9.el9_2.2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src" }, "product_reference": "krb5-0:1.20.1-9.el9_2.2.src", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-devel-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-libs-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-server-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "krb5-server-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-server-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-server-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-server-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-workstation-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "libkadm5-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "libkadm5-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "libkadm5-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "libkadm5-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "libkadm5-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64" }, "product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686" }, "product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le" }, "product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x" }, "product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)", "product_id": "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64" }, "product_reference": "libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "relates_to_product_reference": "BaseOS-9.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "discovery_date": "2024-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2263240" } ], "notes": [ { "category": "description", "text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.", "title": "Vulnerability description" }, { "category": "summary", "text": "freeradius: forgery attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src", "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src", "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-3596" }, { "category": "external", "summary": "RHBZ#2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/", "url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/html/rfc2865", "url": "https://datatracker.ietf.org/doc/html/rfc2865" }, { "category": "external", "summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf", "url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf" }, { "category": "external", "summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt", "url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt" }, { "category": "external", "summary": "https://www.blastradius.fail/", "url": "https://www.blastradius.fail/" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/456537", "url": "https://www.kb.cert.org/vuls/id/456537" } ], "release_date": "2024-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-24T17:57:50+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src", "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src", "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8461" }, { "category": "workaround", "details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.", "product_ids": [ "AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src", "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src", "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src", "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686", "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-0:1.20.1-9.el9_2.2.src", "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-debugsource-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-devel-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-libs-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-libs-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-pkinit-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-server-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-server-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-workstation-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:krb5-workstation-debuginfo-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:libkadm5-0:1.20.1-9.el9_2.2.x86_64", "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.aarch64", "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.i686", "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.ppc64le", "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.s390x", "BaseOS-9.2.0.Z.EUS:libkadm5-debuginfo-0:1.20.1-9.el9_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freeradius: forgery attack" } ] }
rhsa-2024_4826
Vulnerability from csaf_redhat
Published
2024-07-24 13:19
Modified
2024-11-13 16:37
Summary
Red Hat Security Advisory: freeradius:3.0 security update
Notes
Topic
An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4826", "url": "https://access.redhat.com/errata/RHSA-2024:4826" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4826.json" } ], "title": "Red Hat Security Advisory: freeradius:3.0 security update", "tracking": { "current_release_date": "2024-11-13T16:37:20+00:00", "generator": { "date": "2024-11-13T16:37:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2024:4826", "initial_release_date": "2024-07-24T13:19:12+00:00", "revision_history": [ { "date": "2024-07-24T13:19:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-24T13:19:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T16:37:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "freeradius:3.0:8060020240719034751:830b6f11", "product": { "name": "freeradius:3.0:8060020240719034751:830b6f11", "product_id": "freeradius:3.0:8060020240719034751:830b6f11", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/freeradius@3.0:8060020240719034751:830b6f11" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src", "product": { "name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src", "product_id": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product": { "name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_id": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product": { "name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_id": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product": { "name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_id": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product": { "name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_id": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-12.module%2Bel8.6.0%2B22086%2B569c8c49.1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, "product_reference": "freeradius:3.0:8060020240719034751:830b6f11", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src" }, "product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, "product_reference": "freeradius:3.0:8060020240719034751:830b6f11", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src" }, "product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, "product_reference": "freeradius:3.0:8060020240719034751:830b6f11", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src" }, "product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64 as a component of freeradius:3.0:8060020240719034751:830b6f11 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "discovery_date": "2024-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2263240" } ], "notes": [ { "category": "description", "text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.", "title": "Vulnerability description" }, { "category": "summary", "text": "freeradius: forgery attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-3596" }, { "category": "external", "summary": "RHBZ#2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/", "url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/html/rfc2865", "url": "https://datatracker.ietf.org/doc/html/rfc2865" }, { "category": "external", "summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf", "url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf" }, { "category": "external", "summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt", "url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt" }, { "category": "external", "summary": "https://www.blastradius.fail/", "url": "https://www.blastradius.fail/" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/456537", "url": "https://www.kb.cert.org/vuls/id/456537" } ], "release_date": "2024-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T13:19:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4826" }, { "category": "workaround", "details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.", "product_ids": [ "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.AUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.aarch64", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.ppc64le", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.s390x", "AppStream-8.6.0.Z.E4S:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.src", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-debugsource-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-devel-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-doc-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-krb5-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-ldap-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-mysql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-perl-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-postgresql-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-rest-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-sqlite-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-unixODBC-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:freeradius-utils-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64", "AppStream-8.6.0.Z.TUS:freeradius:3.0:8060020240719034751:830b6f11:python3-freeradius-debuginfo-0:3.0.20-12.module+el8.6.0+22086+569c8c49.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freeradius: forgery attack" } ] }
rhsa-2024_4829
Vulnerability from csaf_redhat
Published
2024-07-24 13:27
Modified
2024-12-18 00:30
Summary
Red Hat Security Advisory: freeradius:3.0 security update
Notes
Topic
An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4829", "url": "https://access.redhat.com/errata/RHSA-2024:4829" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4829.json" } ], "title": "Red Hat Security Advisory: freeradius:3.0 security update", "tracking": { "current_release_date": "2024-12-18T00:30:33+00:00", "generator": { "date": "2024-12-18T00:30:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:4829", "initial_release_date": "2024-07-24T13:27:43+00:00", "revision_history": [ { "date": "2024-07-24T13:27:43+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-24T13:27:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:30:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "freeradius:3.0:8080020240719112231:b012cf7d", "product": { "name": "freeradius:3.0:8080020240719112231:b012cf7d", "product_id": "freeradius:3.0:8080020240719112231:b012cf7d", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/freeradius@3.0:8080020240719112231:b012cf7d" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src", "product": { "name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src", "product_id": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product": { "name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_id": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product": { "name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_id": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product": { "name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_id": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product": { "name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_id": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-14.module%2Bel8.8.0%2B22090%2Ba01d0e6a.1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, "product_reference": "freeradius:3.0:8080020240719112231:b012cf7d", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src" }, "product_reference": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64 as a component of freeradius:3.0:8080020240719112231:b012cf7d as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "discovery_date": "2024-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2263240" } ], "notes": [ { "category": "description", "text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.", "title": "Vulnerability description" }, { "category": "summary", "text": "freeradius: forgery attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-3596" }, { "category": "external", "summary": "RHBZ#2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/", "url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/html/rfc2865", "url": "https://datatracker.ietf.org/doc/html/rfc2865" }, { "category": "external", "summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf", "url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf" }, { "category": "external", "summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt", "url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt" }, { "category": "external", "summary": "https://www.blastradius.fail/", "url": "https://www.blastradius.fail/" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/456537", "url": "https://www.kb.cert.org/vuls/id/456537" } ], "release_date": "2024-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T13:27:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4829" }, { "category": "workaround", "details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.", "product_ids": [ "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.src", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-debugsource-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-devel-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-doc-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-krb5-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-ldap-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-mysql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-perl-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-postgresql-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-rest-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-sqlite-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-unixODBC-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:freeradius-utils-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.aarch64", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.ppc64le", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.s390x", "AppStream-8.8.0.Z.EUS:freeradius:3.0:8080020240719112231:b012cf7d:python3-freeradius-debuginfo-0:3.0.20-14.module+el8.8.0+22090+a01d0e6a.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freeradius: forgery attack" } ] }
rhsa-2024_9474
Vulnerability from csaf_redhat
Published
2024-11-12 10:32
Modified
2024-11-13 16:38
Summary
Red Hat Security Advisory: krb5 security update
Notes
Topic
An update for krb5 is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for krb5 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:9474", "url": "https://access.redhat.com/errata/RHSA-2024:9474" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9474.json" } ], "title": "Red Hat Security Advisory: krb5 security update", "tracking": { "current_release_date": "2024-11-13T16:38:34+00:00", "generator": { "date": "2024-11-13T16:38:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2024:9474", "initial_release_date": "2024-11-12T10:32:05+00:00", "revision_history": [ { "date": "2024-11-12T10:32:05+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-12T10:32:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T16:38:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "krb5-0:1.21.1-4.el9_5.src", "product": { "name": "krb5-0:1.21.1-4.el9_5.src", "product_id": "krb5-0:1.21.1-4.el9_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5@1.21.1-4.el9_5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "krb5-libs-0:1.21.1-4.el9_5.aarch64", "product": { "name": "krb5-libs-0:1.21.1-4.el9_5.aarch64", "product_id": "krb5-libs-0:1.21.1-4.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-4.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64", "product": { "name": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64", "product_id": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-4.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-0:1.21.1-4.el9_5.aarch64", "product": { "name": "krb5-server-0:1.21.1-4.el9_5.aarch64", "product_id": "krb5-server-0:1.21.1-4.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.21.1-4.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64", "product": { "name": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64", "product_id": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-4.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.21.1-4.el9_5.aarch64", "product": { "name": "krb5-workstation-0:1.21.1-4.el9_5.aarch64", "product_id": "krb5-workstation-0:1.21.1-4.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-4.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "libkadm5-0:1.21.1-4.el9_5.aarch64", "product": { "name": "libkadm5-0:1.21.1-4.el9_5.aarch64", "product_id": "libkadm5-0:1.21.1-4.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.21.1-4.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64", "product": { "name": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64", "product_id": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-4.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64", "product": { "name": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64", "product_id": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-4.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64", "product": { "name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64", "product_id": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-4.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64", "product": { "name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64", "product_id": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-4.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64", "product": { "name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64", "product_id": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-4.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64", "product": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64", "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-4.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64", "product": { "name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64", "product_id": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-4.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64", "product": { "name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64", "product_id": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-4.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-devel-0:1.21.1-4.el9_5.aarch64", "product": { "name": "krb5-devel-0:1.21.1-4.el9_5.aarch64", "product_id": "krb5-devel-0:1.21.1-4.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-4.el9_5?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "krb5-libs-0:1.21.1-4.el9_5.ppc64le", "product": { "name": "krb5-libs-0:1.21.1-4.el9_5.ppc64le", "product_id": "krb5-libs-0:1.21.1-4.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-4.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le", "product": { "name": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le", "product_id": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-4.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-0:1.21.1-4.el9_5.ppc64le", "product": { "name": "krb5-server-0:1.21.1-4.el9_5.ppc64le", "product_id": "krb5-server-0:1.21.1-4.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.21.1-4.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le", "product": { "name": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le", "product_id": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-4.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le", "product": { "name": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le", "product_id": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-4.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "libkadm5-0:1.21.1-4.el9_5.ppc64le", "product": { "name": "libkadm5-0:1.21.1-4.el9_5.ppc64le", "product_id": "libkadm5-0:1.21.1-4.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.21.1-4.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le", "product": { "name": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le", "product_id": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-4.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "product": { "name": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "product_id": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-4.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le", "product": { "name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le", "product_id": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-4.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le", "product": { "name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le", "product_id": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-4.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le", "product": { "name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le", "product_id": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-4.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le", "product": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le", "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-4.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le", "product": { "name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le", "product_id": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-4.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "product": { "name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "product_id": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-4.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-devel-0:1.21.1-4.el9_5.ppc64le", "product": { "name": "krb5-devel-0:1.21.1-4.el9_5.ppc64le", "product_id": "krb5-devel-0:1.21.1-4.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-4.el9_5?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "krb5-libs-0:1.21.1-4.el9_5.i686", "product": { "name": "krb5-libs-0:1.21.1-4.el9_5.i686", "product_id": "krb5-libs-0:1.21.1-4.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-4.el9_5?arch=i686" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.21.1-4.el9_5.i686", "product": { "name": "krb5-pkinit-0:1.21.1-4.el9_5.i686", "product_id": "krb5-pkinit-0:1.21.1-4.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-4.el9_5?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-0:1.21.1-4.el9_5.i686", "product": { "name": "krb5-server-0:1.21.1-4.el9_5.i686", "product_id": "krb5-server-0:1.21.1-4.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.21.1-4.el9_5?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.21.1-4.el9_5.i686", "product": { "name": "krb5-server-ldap-0:1.21.1-4.el9_5.i686", "product_id": "krb5-server-ldap-0:1.21.1-4.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-4.el9_5?arch=i686" } } }, { "category": "product_version", "name": "libkadm5-0:1.21.1-4.el9_5.i686", "product": { "name": "libkadm5-0:1.21.1-4.el9_5.i686", "product_id": "libkadm5-0:1.21.1-4.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.21.1-4.el9_5?arch=i686" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.21.1-4.el9_5.i686", "product": { "name": "krb5-debugsource-0:1.21.1-4.el9_5.i686", "product_id": "krb5-debugsource-0:1.21.1-4.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-4.el9_5?arch=i686" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.21.1-4.el9_5.i686", "product": { "name": "krb5-debuginfo-0:1.21.1-4.el9_5.i686", "product_id": "krb5-debuginfo-0:1.21.1-4.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-4.el9_5?arch=i686" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686", "product": { "name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686", "product_id": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-4.el9_5?arch=i686" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686", "product": { "name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686", "product_id": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-4.el9_5?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686", "product": { "name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686", "product_id": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-4.el9_5?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686", "product": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686", "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-4.el9_5?arch=i686" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686", "product": { "name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686", "product_id": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-4.el9_5?arch=i686" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686", "product": { "name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686", "product_id": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-4.el9_5?arch=i686" } } }, { "category": "product_version", "name": "krb5-devel-0:1.21.1-4.el9_5.i686", "product": { "name": "krb5-devel-0:1.21.1-4.el9_5.i686", "product_id": "krb5-devel-0:1.21.1-4.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-4.el9_5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "krb5-libs-0:1.21.1-4.el9_5.x86_64", "product": { "name": "krb5-libs-0:1.21.1-4.el9_5.x86_64", "product_id": "krb5-libs-0:1.21.1-4.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-4.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64", "product": { "name": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64", "product_id": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-4.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-0:1.21.1-4.el9_5.x86_64", "product": { "name": "krb5-server-0:1.21.1-4.el9_5.x86_64", "product_id": "krb5-server-0:1.21.1-4.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.21.1-4.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64", "product": { "name": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64", "product_id": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-4.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.21.1-4.el9_5.x86_64", "product": { "name": "krb5-workstation-0:1.21.1-4.el9_5.x86_64", "product_id": "krb5-workstation-0:1.21.1-4.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-4.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "libkadm5-0:1.21.1-4.el9_5.x86_64", "product": { "name": "libkadm5-0:1.21.1-4.el9_5.x86_64", "product_id": "libkadm5-0:1.21.1-4.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.21.1-4.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64", "product": { "name": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64", "product_id": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-4.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64", "product": { "name": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64", "product_id": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-4.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64", "product": { "name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64", "product_id": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-4.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64", "product": { "name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64", "product_id": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-4.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64", "product": { "name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64", "product_id": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-4.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64", "product": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64", "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-4.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64", "product": { "name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64", "product_id": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-4.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64", "product": { "name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64", "product_id": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-4.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-devel-0:1.21.1-4.el9_5.x86_64", "product": { "name": "krb5-devel-0:1.21.1-4.el9_5.x86_64", "product_id": "krb5-devel-0:1.21.1-4.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-4.el9_5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "krb5-libs-0:1.21.1-4.el9_5.s390x", "product": { "name": "krb5-libs-0:1.21.1-4.el9_5.s390x", "product_id": "krb5-libs-0:1.21.1-4.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-4.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.21.1-4.el9_5.s390x", "product": { "name": "krb5-pkinit-0:1.21.1-4.el9_5.s390x", "product_id": "krb5-pkinit-0:1.21.1-4.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-4.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-0:1.21.1-4.el9_5.s390x", "product": { "name": "krb5-server-0:1.21.1-4.el9_5.s390x", "product_id": "krb5-server-0:1.21.1-4.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.21.1-4.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x", "product": { "name": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x", "product_id": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-4.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.21.1-4.el9_5.s390x", "product": { "name": "krb5-workstation-0:1.21.1-4.el9_5.s390x", "product_id": "krb5-workstation-0:1.21.1-4.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-4.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "libkadm5-0:1.21.1-4.el9_5.s390x", "product": { "name": "libkadm5-0:1.21.1-4.el9_5.s390x", "product_id": "libkadm5-0:1.21.1-4.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.21.1-4.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.21.1-4.el9_5.s390x", "product": { "name": "krb5-debugsource-0:1.21.1-4.el9_5.s390x", "product_id": "krb5-debugsource-0:1.21.1-4.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-4.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x", "product": { "name": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x", "product_id": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-4.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x", "product": { "name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x", "product_id": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-4.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x", "product": { "name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x", "product_id": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-4.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x", "product": { "name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x", "product_id": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-4.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x", "product": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x", "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-4.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x", "product": { "name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x", "product_id": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-4.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x", "product": { "name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x", "product_id": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-4.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "krb5-devel-0:1.21.1-4.el9_5.s390x", "product": { "name": "krb5-devel-0:1.21.1-4.el9_5.s390x", "product_id": "krb5-devel-0:1.21.1-4.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-4.el9_5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.21.1-4.el9_5.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src" }, "product_reference": "krb5-0:1.21.1-4.el9_5.src", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686" }, "product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686" }, "product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-devel-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686" }, "product_reference": "krb5-devel-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-devel-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-devel-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-devel-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-libs-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686" }, "product_reference": "krb5-libs-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-libs-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-libs-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-libs-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686" }, "product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686" }, "product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686" }, "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-server-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686" }, "product_reference": "krb5-server-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-server-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-server-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-server-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686" }, "product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686" }, "product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-workstation-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-workstation-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-workstation-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686" }, "product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "libkadm5-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686" }, "product_reference": "libkadm5-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "libkadm5-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x" }, "product_reference": "libkadm5-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "libkadm5-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686" }, "product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x" }, "product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.21.1-4.el9_5.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src" }, "product_reference": "krb5-0:1.21.1-4.el9_5.src", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686" }, "product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-debuginfo-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686" }, "product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-debugsource-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-devel-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686" }, "product_reference": "krb5-devel-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-devel-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-devel-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-devel-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-libs-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686" }, "product_reference": "krb5-libs-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-libs-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-libs-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-libs-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686" }, "product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686" }, "product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-pkinit-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686" }, "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-server-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686" }, "product_reference": "krb5-server-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-server-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-server-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-server-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686" }, "product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686" }, "product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-server-ldap-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-workstation-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-workstation-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-workstation-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-workstation-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686" }, "product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x" }, "product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "libkadm5-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686" }, "product_reference": "libkadm5-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "libkadm5-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x" }, "product_reference": "libkadm5-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "libkadm5-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64" }, "product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686" }, "product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.i686", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le" }, "product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x" }, "product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64" }, "product_reference": "libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64", "relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "discovery_date": "2024-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2263240" } ], "notes": [ { "category": "description", "text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.", "title": "Vulnerability description" }, { "category": "summary", "text": "freeradius: forgery attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src", "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src", "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-3596" }, { "category": "external", "summary": "RHBZ#2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/", "url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/html/rfc2865", "url": "https://datatracker.ietf.org/doc/html/rfc2865" }, { "category": "external", "summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf", "url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf" }, { "category": "external", "summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt", "url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt" }, { "category": "external", "summary": "https://www.blastradius.fail/", "url": "https://www.blastradius.fail/" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/456537", "url": "https://www.kb.cert.org/vuls/id/456537" } ], "release_date": "2024-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-12T10:32:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src", "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src", "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9474" }, { "category": "workaround", "details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.", "product_ids": [ "AppStream-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src", "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src", "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src", "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686", "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-0:1.21.1-4.el9_5.src", "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-debugsource-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-devel-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-libs-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-libs-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-pkinit-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-server-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-server-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-server-ldap-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:krb5-workstation-debuginfo-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libkadm5-0:1.21.1-4.el9_5.x86_64", "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.aarch64", "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.i686", "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.ppc64le", "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.s390x", "BaseOS-9.5.0.Z.MAIN:libkadm5-debuginfo-0:1.21.1-4.el9_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freeradius: forgery attack" } ] }
rhsa-2024_8788
Vulnerability from csaf_redhat
Published
2024-11-04 01:44
Modified
2024-11-13 16:38
Summary
Red Hat Security Advisory: krb5 security update
Notes
Topic
An update for krb5 is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for krb5 is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8788", "url": "https://access.redhat.com/errata/RHSA-2024:8788" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "external", "summary": "RHEL-55453", "url": "https://issues.redhat.com/browse/RHEL-55453" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8788.json" } ], "title": "Red Hat Security Advisory: krb5 security update", "tracking": { "current_release_date": "2024-11-13T16:38:14+00:00", "generator": { "date": "2024-11-13T16:38:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2024:8788", "initial_release_date": "2024-11-04T01:44:02+00:00", "revision_history": [ { "date": "2024-11-04T01:44:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-04T01:44:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T16:38:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7 ELS)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "krb5-0:1.15.1-55.el7_9.3.src", "product": { "name": "krb5-0:1.15.1-55.el7_9.3.src", "product_id": "krb5-0:1.15.1-55.el7_9.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5@1.15.1-55.el7_9.3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc", "product": { "name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc", "product_id": "krb5-devel-0:1.15.1-55.el7_9.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=ppc" } } }, { "category": "product_version", "name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc", "product": { "name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc", "product_id": "krb5-libs-0:1.15.1-55.el7_9.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=ppc" } } }, { "category": "product_version", "name": "libkadm5-0:1.15.1-55.el7_9.3.ppc", "product": { "name": "libkadm5-0:1.15.1-55.el7_9.3.ppc", "product_id": "libkadm5-0:1.15.1-55.el7_9.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=ppc" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc", "product": { "name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc", "product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64", "product": { "name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64", "product_id": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=ppc64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64", "product": { "name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64", "product_id": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=ppc64" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64", "product": { "name": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64", "product_id": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.15.1-55.el7_9.3?arch=ppc64" } } }, { "category": "product_version", "name": "krb5-server-0:1.15.1-55.el7_9.3.ppc64", "product": { "name": "krb5-server-0:1.15.1-55.el7_9.3.ppc64", "product_id": "krb5-server-0:1.15.1-55.el7_9.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.15.1-55.el7_9.3?arch=ppc64" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64", "product": { "name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64", "product_id": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.15.1-55.el7_9.3?arch=ppc64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64", "product": { "name": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64", "product_id": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.15.1-55.el7_9.3?arch=ppc64" } } }, { "category": "product_version", "name": "libkadm5-0:1.15.1-55.el7_9.3.ppc64", "product": { "name": "libkadm5-0:1.15.1-55.el7_9.3.ppc64", "product_id": "libkadm5-0:1.15.1-55.el7_9.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=ppc64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64", "product": { "name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64", "product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.15.1-55.el7_9.3.s390", "product": { "name": "krb5-devel-0:1.15.1-55.el7_9.3.s390", "product_id": "krb5-devel-0:1.15.1-55.el7_9.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=s390" } } }, { "category": "product_version", "name": "krb5-libs-0:1.15.1-55.el7_9.3.s390", "product": { "name": "krb5-libs-0:1.15.1-55.el7_9.3.s390", "product_id": "krb5-libs-0:1.15.1-55.el7_9.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=s390" } } }, { "category": "product_version", "name": "libkadm5-0:1.15.1-55.el7_9.3.s390", "product": { "name": "libkadm5-0:1.15.1-55.el7_9.3.s390", "product_id": "libkadm5-0:1.15.1-55.el7_9.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=s390" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390", "product": { "name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390", "product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.15.1-55.el7_9.3.s390x", "product": { "name": "krb5-devel-0:1.15.1-55.el7_9.3.s390x", "product_id": "krb5-devel-0:1.15.1-55.el7_9.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-libs-0:1.15.1-55.el7_9.3.s390x", "product": { "name": "krb5-libs-0:1.15.1-55.el7_9.3.s390x", "product_id": "krb5-libs-0:1.15.1-55.el7_9.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.15.1-55.el7_9.3.s390x", "product": { "name": "krb5-pkinit-0:1.15.1-55.el7_9.3.s390x", "product_id": "krb5-pkinit-0:1.15.1-55.el7_9.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.15.1-55.el7_9.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-0:1.15.1-55.el7_9.3.s390x", "product": { "name": "krb5-server-0:1.15.1-55.el7_9.3.s390x", "product_id": "krb5-server-0:1.15.1-55.el7_9.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.15.1-55.el7_9.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x", "product": { "name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x", "product_id": "krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.15.1-55.el7_9.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.15.1-55.el7_9.3.s390x", "product": { "name": "krb5-workstation-0:1.15.1-55.el7_9.3.s390x", "product_id": "krb5-workstation-0:1.15.1-55.el7_9.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.15.1-55.el7_9.3?arch=s390x" } } }, { "category": "product_version", "name": "libkadm5-0:1.15.1-55.el7_9.3.s390x", "product": { "name": "libkadm5-0:1.15.1-55.el7_9.3.s390x", "product_id": "libkadm5-0:1.15.1-55.el7_9.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x", "product": { "name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x", "product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.15.1-55.el7_9.3.x86_64", "product": { "name": "krb5-devel-0:1.15.1-55.el7_9.3.x86_64", "product_id": "krb5-devel-0:1.15.1-55.el7_9.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.15.1-55.el7_9.3.x86_64", "product": { "name": "krb5-libs-0:1.15.1-55.el7_9.3.x86_64", "product_id": "krb5-libs-0:1.15.1-55.el7_9.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64", "product": { "name": "krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64", "product_id": "krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.15.1-55.el7_9.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-0:1.15.1-55.el7_9.3.x86_64", "product": { "name": "krb5-server-0:1.15.1-55.el7_9.3.x86_64", "product_id": "krb5-server-0:1.15.1-55.el7_9.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.15.1-55.el7_9.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64", "product": { "name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64", "product_id": "krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.15.1-55.el7_9.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.15.1-55.el7_9.3.x86_64", "product": { "name": "krb5-workstation-0:1.15.1-55.el7_9.3.x86_64", "product_id": "krb5-workstation-0:1.15.1-55.el7_9.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.15.1-55.el7_9.3?arch=x86_64" } } }, { "category": "product_version", "name": "libkadm5-0:1.15.1-55.el7_9.3.x86_64", "product": { "name": "libkadm5-0:1.15.1-55.el7_9.3.x86_64", "product_id": "libkadm5-0:1.15.1-55.el7_9.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64", "product": { "name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64", "product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.15.1-55.el7_9.3.i686", "product": { "name": "krb5-devel-0:1.15.1-55.el7_9.3.i686", "product_id": "krb5-devel-0:1.15.1-55.el7_9.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=i686" } } }, { "category": "product_version", "name": "krb5-libs-0:1.15.1-55.el7_9.3.i686", "product": { "name": "krb5-libs-0:1.15.1-55.el7_9.3.i686", "product_id": "krb5-libs-0:1.15.1-55.el7_9.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=i686" } } }, { "category": "product_version", "name": "libkadm5-0:1.15.1-55.el7_9.3.i686", "product": { "name": "libkadm5-0:1.15.1-55.el7_9.3.i686", "product_id": "libkadm5-0:1.15.1-55.el7_9.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=i686" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.i686", "product": { "name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.i686", "product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64le", "product": { "name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64le", "product_id": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.15.1-55.el7_9.3?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64le", "product": { "name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64le", "product_id": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.15.1-55.el7_9.3?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le", "product": { "name": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le", "product_id": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.15.1-55.el7_9.3?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-0:1.15.1-55.el7_9.3.ppc64le", "product": { "name": "krb5-server-0:1.15.1-55.el7_9.3.ppc64le", "product_id": "krb5-server-0:1.15.1-55.el7_9.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.15.1-55.el7_9.3?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le", "product": { "name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le", "product_id": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.15.1-55.el7_9.3?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le", "product": { "name": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le", "product_id": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.15.1-55.el7_9.3?arch=ppc64le" } } }, { "category": "product_version", "name": "libkadm5-0:1.15.1-55.el7_9.3.ppc64le", "product": { "name": "libkadm5-0:1.15.1-55.el7_9.3.ppc64le", "product_id": "libkadm5-0:1.15.1-55.el7_9.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.15.1-55.el7_9.3?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le", "product": { "name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le", "product_id": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.15.1-55.el7_9.3?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.15.1-55.el7_9.3.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-0:1.15.1-55.el7_9.3.src" }, "product_reference": "krb5-0:1.15.1-55.el7_9.3.src", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.i686" }, "product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.i686", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc" }, "product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64" }, "product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le" }, "product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390" }, "product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x" }, "product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64" }, "product_reference": "krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.15.1-55.el7_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.i686" }, "product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.i686", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc" }, "product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.ppc", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64" }, "product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64le" }, "product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.15.1-55.el7_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390" }, "product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.s390", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390x" }, "product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.x86_64" }, "product_reference": "krb5-devel-0:1.15.1-55.el7_9.3.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.15.1-55.el7_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.i686" }, "product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.i686", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc" }, "product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.ppc", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64" }, "product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64le" }, "product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.15.1-55.el7_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390" }, "product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.s390", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390x" }, "product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.x86_64" }, "product_reference": "krb5-libs-0:1.15.1-55.el7_9.3.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64" }, "product_reference": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le" }, "product_reference": "krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.s390x" }, "product_reference": "krb5-pkinit-0:1.15.1-55.el7_9.3.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64" }, "product_reference": "krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64" }, "product_reference": "krb5-server-0:1.15.1-55.el7_9.3.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64le" }, "product_reference": "krb5-server-0:1.15.1-55.el7_9.3.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.s390x" }, "product_reference": "krb5-server-0:1.15.1-55.el7_9.3.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.x86_64" }, "product_reference": "krb5-server-0:1.15.1-55.el7_9.3.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64" }, "product_reference": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le" }, "product_reference": "krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x" }, "product_reference": "krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64" }, "product_reference": "krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64" }, "product_reference": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le" }, "product_reference": "krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.s390x" }, "product_reference": "krb5-workstation-0:1.15.1-55.el7_9.3.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.x86_64" }, "product_reference": "krb5-workstation-0:1.15.1-55.el7_9.3.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.15.1-55.el7_9.3.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.i686" }, "product_reference": "libkadm5-0:1.15.1-55.el7_9.3.i686", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.15.1-55.el7_9.3.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc" }, "product_reference": "libkadm5-0:1.15.1-55.el7_9.3.ppc", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.15.1-55.el7_9.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64" }, "product_reference": "libkadm5-0:1.15.1-55.el7_9.3.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.15.1-55.el7_9.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64le" }, "product_reference": "libkadm5-0:1.15.1-55.el7_9.3.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.15.1-55.el7_9.3.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390" }, "product_reference": "libkadm5-0:1.15.1-55.el7_9.3.s390", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.15.1-55.el7_9.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390x" }, "product_reference": "libkadm5-0:1.15.1-55.el7_9.3.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.15.1-55.el7_9.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.x86_64" }, "product_reference": "libkadm5-0:1.15.1-55.el7_9.3.x86_64", "relates_to_product_reference": "7Server-ELS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "discovery_date": "2024-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2263240" } ], "notes": [ { "category": "description", "text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.", "title": "Vulnerability description" }, { "category": "summary", "text": "freeradius: forgery attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:krb5-0:1.15.1-55.el7_9.3.src", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.i686", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.i686", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.i686", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.i686", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-3596" }, { "category": "external", "summary": "RHBZ#2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/", "url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/html/rfc2865", "url": "https://datatracker.ietf.org/doc/html/rfc2865" }, { "category": "external", "summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf", "url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf" }, { "category": "external", "summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt", "url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt" }, { "category": "external", "summary": "https://www.blastradius.fail/", "url": "https://www.blastradius.fail/" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/456537", "url": "https://www.kb.cert.org/vuls/id/456537" } ], "release_date": "2024-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T01:44:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:krb5-0:1.15.1-55.el7_9.3.src", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.i686", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.i686", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.i686", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.i686", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8788" }, { "category": "workaround", "details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.", "product_ids": [ "7Server-ELS:krb5-0:1.15.1-55.el7_9.3.src", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.i686", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.i686", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.i686", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.i686", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:krb5-0:1.15.1-55.el7_9.3.src", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.i686", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-debuginfo-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.i686", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-devel-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.i686", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-libs-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-pkinit-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-server-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-server-ldap-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:krb5-workstation-0:1.15.1-55.el7_9.3.x86_64", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.i686", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.ppc64le", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.s390x", "7Server-ELS:libkadm5-0:1.15.1-55.el7_9.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freeradius: forgery attack" } ] }
rhsa-2024_4828
Vulnerability from csaf_redhat
Published
2024-07-24 13:19
Modified
2024-12-18 00:30
Summary
Red Hat Security Advisory: freeradius security update
Notes
Topic
An update for freeradius is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for freeradius is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4828", "url": "https://access.redhat.com/errata/RHSA-2024:4828" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4828.json" } ], "title": "Red Hat Security Advisory: freeradius security update", "tracking": { "current_release_date": "2024-12-18T00:30:55+00:00", "generator": { "date": "2024-12-18T00:30:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:4828", "initial_release_date": "2024-07-24T13:19:11+00:00", "revision_history": [ { "date": "2024-07-24T13:19:11+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-24T13:19:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:30:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder EUS (v.9.2)", "product": { "name": "Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.2::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64", "product_id": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-38.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64", "product_id": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-38.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64", "product_id": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-38.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64", "product_id": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-38.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64", "product_id": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-38.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64", "product_id": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-38.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product_id": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-38.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product_id": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-38.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product_id": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-38.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product_id": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-38.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product_id": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-38.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-38.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "freeradius-0:3.0.21-38.el9_2.2.aarch64", "product_id": "freeradius-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.21-38.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64", "product_id": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-38.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64", "product_id": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-38.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64", "product_id": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-38.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64", "product_id": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-38.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64", "product_id": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-38.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64", "product_id": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-38.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64", "product_id": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-38.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product_id": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-38.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product_id": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-38.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product_id": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-38.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product_id": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-38.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product": { "name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product_id": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-38.el9_2.2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-38.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-38.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-38.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-38.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-38.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-38.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "freeradius-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "freeradius-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.21-38.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-38.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-38.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-38.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-38.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-38.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-38.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-38.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product": { "name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product_id": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-38.el9_2.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64", "product_id": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-38.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64", "product_id": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-38.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64", "product_id": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-38.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64", "product_id": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-38.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64", "product_id": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-38.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64", "product_id": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-38.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product_id": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-38.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product_id": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-38.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product_id": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-38.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product_id": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-38.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product_id": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-38.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-38.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "freeradius-0:3.0.21-38.el9_2.2.x86_64", "product_id": "freeradius-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.21-38.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64", "product_id": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-38.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64", "product_id": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-38.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64", "product_id": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-38.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64", "product_id": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-38.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64", "product_id": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-38.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64", "product_id": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-38.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64", "product_id": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-38.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product_id": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-38.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product_id": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-38.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product_id": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-38.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product_id": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-38.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product": { "name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product_id": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-38.el9_2.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x", "product_id": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-38.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x", "product_id": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-38.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x", "product_id": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-38.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x", "product_id": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-38.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x", "product_id": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-38.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x", "product_id": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-38.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product_id": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-38.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product_id": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-38.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product_id": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-38.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product_id": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-38.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product_id": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-38.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-38.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "freeradius-0:3.0.21-38.el9_2.2.s390x", "product_id": "freeradius-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.21-38.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x", "product_id": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-38.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x", "product_id": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-38.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x", "product_id": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-38.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x", "product_id": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-38.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x", "product_id": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-38.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x", "product_id": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-38.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x", "product_id": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-38.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product_id": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-38.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product_id": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-38.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product_id": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-38.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product_id": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-38.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product": { "name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product_id": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-38.el9_2.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.21-38.el9_2.2.src", "product": { "name": "freeradius-0:3.0.21-38.el9_2.2.src", "product_id": "freeradius-0:3.0.21-38.el9_2.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.21-38.el9_2.2?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-38.el9_2.2.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src" }, "product_reference": "freeradius-0:3.0.21-38.el9_2.2.src", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-38.el9_2.2.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src" }, "product_reference": "freeradius-0:3.0.21-38.el9_2.2.src", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-devel-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-doc-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-perl-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-rest-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-utils-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "python3-freeradius-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)", "product_id": "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "relates_to_product_reference": "CRB-9.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "discovery_date": "2024-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2263240" } ], "notes": [ { "category": "description", "text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.", "title": "Vulnerability description" }, { "category": "summary", "text": "freeradius: forgery attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src", "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src", "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-3596" }, { "category": "external", "summary": "RHBZ#2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/", "url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/html/rfc2865", "url": "https://datatracker.ietf.org/doc/html/rfc2865" }, { "category": "external", "summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf", "url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf" }, { "category": "external", "summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt", "url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt" }, { "category": "external", "summary": "https://www.blastradius.fail/", "url": "https://www.blastradius.fail/" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/456537", "url": "https://www.kb.cert.org/vuls/id/456537" } ], "release_date": "2024-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-24T13:19:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src", "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src", "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4828" }, { "category": "workaround", "details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.", "product_ids": [ "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src", "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src", "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src", "AppStream-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.src", "CRB-9.2.0.Z.EUS:freeradius-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-debugsource-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-devel-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-doc-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-krb5-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-krb5-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-ldap-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-ldap-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-mysql-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-mysql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-perl-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-perl-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-postgresql-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-postgresql-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-rest-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-rest-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-sqlite-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-sqlite-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-utils-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:freeradius-utils-debuginfo-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:python3-freeradius-0:3.0.21-38.el9_2.2.x86_64", "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.aarch64", "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.ppc64le", "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.s390x", "CRB-9.2.0.Z.EUS:python3-freeradius-debuginfo-0:3.0.21-38.el9_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freeradius: forgery attack" } ] }
rhsa-2024_8789
Vulnerability from csaf_redhat
Published
2024-11-04 01:11
Modified
2024-11-13 16:37
Summary
Red Hat Security Advisory: krb5 security update
Notes
Topic
An update for krb5 is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8789", "url": "https://access.redhat.com/errata/RHSA-2024:8789" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8789.json" } ], "title": "Red Hat Security Advisory: krb5 security update", "tracking": { "current_release_date": "2024-11-13T16:37:41+00:00", "generator": { "date": "2024-11-13T16:37:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2024:8789", "initial_release_date": "2024-11-04T01:11:07+00:00", "revision_history": [ { "date": "2024-11-04T01:11:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-04T01:11:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T16:37:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:8.2::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "krb5-0:1.17-19.el8_2.2.src", "product": { "name": "krb5-0:1.17-19.el8_2.2.src", "product_id": "krb5-0:1.17-19.el8_2.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5@1.17-19.el8_2.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.17-19.el8_2.2.i686", "product": { "name": "krb5-devel-0:1.17-19.el8_2.2.i686", "product_id": "krb5-devel-0:1.17-19.el8_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.17-19.el8_2.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-libs-0:1.17-19.el8_2.2.i686", "product": { "name": "krb5-libs-0:1.17-19.el8_2.2.i686", "product_id": "krb5-libs-0:1.17-19.el8_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.17-19.el8_2.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.17-19.el8_2.2.i686", "product": { "name": "krb5-pkinit-0:1.17-19.el8_2.2.i686", "product_id": "krb5-pkinit-0:1.17-19.el8_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.17-19.el8_2.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-0:1.17-19.el8_2.2.i686", "product": { "name": "krb5-server-0:1.17-19.el8_2.2.i686", "product_id": "krb5-server-0:1.17-19.el8_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.17-19.el8_2.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.17-19.el8_2.2.i686", "product": { "name": "krb5-server-ldap-0:1.17-19.el8_2.2.i686", "product_id": "krb5-server-ldap-0:1.17-19.el8_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.17-19.el8_2.2?arch=i686" } } }, { "category": "product_version", "name": "libkadm5-0:1.17-19.el8_2.2.i686", "product": { "name": "libkadm5-0:1.17-19.el8_2.2.i686", "product_id": "libkadm5-0:1.17-19.el8_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.17-19.el8_2.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.17-19.el8_2.2.i686", "product": { "name": "krb5-debugsource-0:1.17-19.el8_2.2.i686", "product_id": "krb5-debugsource-0:1.17-19.el8_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.17-19.el8_2.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.17-19.el8_2.2.i686", "product": { "name": "krb5-debuginfo-0:1.17-19.el8_2.2.i686", "product_id": "krb5-debuginfo-0:1.17-19.el8_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.17-19.el8_2.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686", "product": { "name": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686", "product_id": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.17-19.el8_2.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686", "product": { "name": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686", "product_id": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.17-19.el8_2.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686", "product": { "name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686", "product_id": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.17-19.el8_2.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.17-19.el8_2.2.i686", "product": { "name": "krb5-server-debuginfo-0:1.17-19.el8_2.2.i686", "product_id": "krb5-server-debuginfo-0:1.17-19.el8_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.17-19.el8_2.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686", "product": { "name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686", "product_id": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.17-19.el8_2.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686", "product": { "name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686", "product_id": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.17-19.el8_2.2?arch=i686" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.17-19.el8_2.2.i686", "product": { "name": "libkadm5-debuginfo-0:1.17-19.el8_2.2.i686", "product_id": "libkadm5-debuginfo-0:1.17-19.el8_2.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.17-19.el8_2.2?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.17-19.el8_2.2.x86_64", "product": { "name": "krb5-devel-0:1.17-19.el8_2.2.x86_64", "product_id": "krb5-devel-0:1.17-19.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.17-19.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.17-19.el8_2.2.x86_64", "product": { "name": "krb5-libs-0:1.17-19.el8_2.2.x86_64", "product_id": "krb5-libs-0:1.17-19.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.17-19.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.17-19.el8_2.2.x86_64", "product": { "name": "krb5-pkinit-0:1.17-19.el8_2.2.x86_64", "product_id": "krb5-pkinit-0:1.17-19.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.17-19.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-0:1.17-19.el8_2.2.x86_64", "product": { "name": "krb5-server-0:1.17-19.el8_2.2.x86_64", "product_id": "krb5-server-0:1.17-19.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.17-19.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.17-19.el8_2.2.x86_64", "product": { "name": "krb5-server-ldap-0:1.17-19.el8_2.2.x86_64", "product_id": "krb5-server-ldap-0:1.17-19.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.17-19.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.17-19.el8_2.2.x86_64", "product": { "name": "krb5-workstation-0:1.17-19.el8_2.2.x86_64", "product_id": "krb5-workstation-0:1.17-19.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.17-19.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "libkadm5-0:1.17-19.el8_2.2.x86_64", "product": { "name": "libkadm5-0:1.17-19.el8_2.2.x86_64", "product_id": "libkadm5-0:1.17-19.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.17-19.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.17-19.el8_2.2.x86_64", "product": { "name": "krb5-debugsource-0:1.17-19.el8_2.2.x86_64", "product_id": "krb5-debugsource-0:1.17-19.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.17-19.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.17-19.el8_2.2.x86_64", "product": { "name": "krb5-debuginfo-0:1.17-19.el8_2.2.x86_64", "product_id": "krb5-debuginfo-0:1.17-19.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.17-19.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64", "product": { "name": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64", "product_id": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.17-19.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64", "product": { "name": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64", "product_id": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.17-19.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64", "product": { "name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64", "product_id": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.17-19.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64", "product": { "name": "krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64", "product_id": "krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.17-19.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64", "product": { "name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64", "product_id": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.17-19.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64", "product": { "name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64", "product_id": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.17-19.el8_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64", "product": { "name": "libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64", "product_id": "libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.17-19.el8_2.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.17-19.el8_2.2.src as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.2.src" }, "product_reference": "krb5-0:1.17-19.el8_2.2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.i686" }, "product_reference": "krb5-debuginfo-0:1.17-19.el8_2.2.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.x86_64" }, "product_reference": "krb5-debuginfo-0:1.17-19.el8_2.2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.i686" }, "product_reference": "krb5-debugsource-0:1.17-19.el8_2.2.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.x86_64" }, "product_reference": "krb5-debugsource-0:1.17-19.el8_2.2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.i686" }, "product_reference": "krb5-devel-0:1.17-19.el8_2.2.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.x86_64" }, "product_reference": "krb5-devel-0:1.17-19.el8_2.2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686" }, "product_reference": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64" }, "product_reference": "krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.i686" }, "product_reference": "krb5-libs-0:1.17-19.el8_2.2.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.x86_64" }, "product_reference": "krb5-libs-0:1.17-19.el8_2.2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686" }, "product_reference": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64" }, "product_reference": "krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.i686" }, "product_reference": "krb5-pkinit-0:1.17-19.el8_2.2.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.x86_64" }, "product_reference": "krb5-pkinit-0:1.17-19.el8_2.2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686" }, "product_reference": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.i686" }, "product_reference": "krb5-server-0:1.17-19.el8_2.2.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.x86_64" }, "product_reference": "krb5-server-0:1.17-19.el8_2.2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.i686" }, "product_reference": "krb5-server-debuginfo-0:1.17-19.el8_2.2.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64" }, "product_reference": "krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.i686" }, "product_reference": "krb5-server-ldap-0:1.17-19.el8_2.2.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.x86_64" }, "product_reference": "krb5-server-ldap-0:1.17-19.el8_2.2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.2.x86_64" }, "product_reference": "krb5-workstation-0:1.17-19.el8_2.2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686" }, "product_reference": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64" }, "product_reference": "krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.i686" }, "product_reference": "libkadm5-0:1.17-19.el8_2.2.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.x86_64" }, "product_reference": "libkadm5-0:1.17-19.el8_2.2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.17-19.el8_2.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.i686" }, "product_reference": "libkadm5-debuginfo-0:1.17-19.el8_2.2.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64" }, "product_reference": "libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "discovery_date": "2024-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2263240" } ], "notes": [ { "category": "description", "text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.", "title": "Vulnerability description" }, { "category": "summary", "text": "freeradius: forgery attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.2.src", "BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-3596" }, { "category": "external", "summary": "RHBZ#2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/", "url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/html/rfc2865", "url": "https://datatracker.ietf.org/doc/html/rfc2865" }, { "category": "external", "summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf", "url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf" }, { "category": "external", "summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt", "url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt" }, { "category": "external", "summary": "https://www.blastradius.fail/", "url": "https://www.blastradius.fail/" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/456537", "url": "https://www.kb.cert.org/vuls/id/456537" } ], "release_date": "2024-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T01:11:07+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.2.src", "BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8789" }, { "category": "workaround", "details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.", "product_ids": [ "BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.2.src", "BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.AUS:krb5-0:1.17-19.el8_2.2.src", "BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-debugsource-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-devel-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-devel-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-libs-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-libs-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-pkinit-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-pkinit-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-server-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-server-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-workstation-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:krb5-workstation-debuginfo-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:libkadm5-0:1.17-19.el8_2.2.x86_64", "BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.i686", "BaseOS-8.2.0.Z.AUS:libkadm5-debuginfo-0:1.17-19.el8_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freeradius: forgery attack" } ] }
rhsa-2024_8577
Vulnerability from csaf_redhat
Published
2024-10-29 18:51
Modified
2024-12-18 00:31
Summary
Red Hat Security Advisory: krb5 security update
Notes
Topic
An update for krb5 is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for krb5 is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8577", "url": "https://access.redhat.com/errata/RHSA-2024:8577" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8577.json" } ], "title": "Red Hat Security Advisory: krb5 security update", "tracking": { "current_release_date": "2024-12-18T00:31:21+00:00", "generator": { "date": "2024-12-18T00:31:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:8577", "initial_release_date": "2024-10-29T18:51:38+00:00", "revision_history": [ { "date": "2024-10-29T18:51:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-29T18:51:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:31:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product": { "name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:9.0::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "krb5-0:1.19.1-16.el9_0.2.src", "product": { "name": "krb5-0:1.19.1-16.el9_0.2.src", "product_id": "krb5-0:1.19.1-16.el9_0.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5@1.19.1-16.el9_0.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64", "product": { "name": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64", "product_id": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64", "product": { "name": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64", "product_id": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-0:1.19.1-16.el9_0.2.aarch64", "product": { "name": "krb5-server-0:1.19.1-16.el9_0.2.aarch64", "product_id": "krb5-server-0:1.19.1-16.el9_0.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64", "product": { "name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64", "product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64", "product": { "name": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64", "product_id": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.19.1-16.el9_0.2?arch=aarch64" } } }, { "category": "product_version", "name": "libkadm5-0:1.19.1-16.el9_0.2.aarch64", "product": { "name": "libkadm5-0:1.19.1-16.el9_0.2.aarch64", "product_id": "libkadm5-0:1.19.1-16.el9_0.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64", "product": { "name": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64", "product_id": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "product": { "name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "product": { "name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "product": { "name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "product": { "name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "product": { "name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "product": { "name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.2?arch=aarch64" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "product": { "name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64", "product": { "name": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64", "product_id": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le", "product": { "name": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le", "product_id": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le", "product": { "name": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le", "product_id": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le", "product": { "name": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le", "product_id": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le", "product": { "name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le", "product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le", "product": { "name": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le", "product_id": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.19.1-16.el9_0.2?arch=ppc64le" } } }, { "category": "product_version", "name": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le", "product": { "name": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le", "product_id": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le", "product": { "name": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le", "product_id": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "product": { "name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "product": { "name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "product": { "name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "product": { "name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "product": { "name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "product": { "name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "product": { "name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le", "product": { "name": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le", "product_id": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "krb5-libs-0:1.19.1-16.el9_0.2.i686", "product": { "name": "krb5-libs-0:1.19.1-16.el9_0.2.i686", "product_id": "krb5-libs-0:1.19.1-16.el9_0.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686", "product": { "name": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686", "product_id": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-0:1.19.1-16.el9_0.2.i686", "product": { "name": "krb5-server-0:1.19.1-16.el9_0.2.i686", "product_id": "krb5-server-0:1.19.1-16.el9_0.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686", "product": { "name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686", "product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.2?arch=i686" } } }, { "category": "product_version", "name": "libkadm5-0:1.19.1-16.el9_0.2.i686", "product": { "name": "libkadm5-0:1.19.1-16.el9_0.2.i686", "product_id": "libkadm5-0:1.19.1-16.el9_0.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686", "product": { "name": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686", "product_id": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686", "product": { "name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686", "product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686", "product": { "name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686", "product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686", "product": { "name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686", "product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686", "product": { "name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686", "product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686", "product": { "name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686", "product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686", "product": { "name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686", "product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.2?arch=i686" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686", "product": { "name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686", "product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-devel-0:1.19.1-16.el9_0.2.i686", "product": { "name": "krb5-devel-0:1.19.1-16.el9_0.2.i686", "product_id": "krb5-devel-0:1.19.1-16.el9_0.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.2?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64", "product": { "name": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64", "product_id": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64", "product": { "name": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64", "product_id": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-0:1.19.1-16.el9_0.2.x86_64", "product": { "name": "krb5-server-0:1.19.1-16.el9_0.2.x86_64", "product_id": "krb5-server-0:1.19.1-16.el9_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64", "product": { "name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64", "product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64", "product": { "name": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64", "product_id": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.19.1-16.el9_0.2?arch=x86_64" } } }, { "category": "product_version", "name": "libkadm5-0:1.19.1-16.el9_0.2.x86_64", "product": { "name": "libkadm5-0:1.19.1-16.el9_0.2.x86_64", "product_id": "libkadm5-0:1.19.1-16.el9_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64", "product": { "name": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64", "product_id": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "product": { "name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "product": { "name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "product": { "name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "product": { "name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "product": { "name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "product": { "name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.2?arch=x86_64" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "product": { "name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64", "product": { "name": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64", "product_id": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "krb5-libs-0:1.19.1-16.el9_0.2.s390x", "product": { "name": "krb5-libs-0:1.19.1-16.el9_0.2.s390x", "product_id": "krb5-libs-0:1.19.1-16.el9_0.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.19.1-16.el9_0.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x", "product": { "name": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x", "product_id": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.19.1-16.el9_0.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-0:1.19.1-16.el9_0.2.s390x", "product": { "name": "krb5-server-0:1.19.1-16.el9_0.2.s390x", "product_id": "krb5-server-0:1.19.1-16.el9_0.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.19.1-16.el9_0.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x", "product": { "name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x", "product_id": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.19.1-16.el9_0.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x", "product": { "name": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x", "product_id": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.19.1-16.el9_0.2?arch=s390x" } } }, { "category": "product_version", "name": "libkadm5-0:1.19.1-16.el9_0.2.s390x", "product": { "name": "libkadm5-0:1.19.1-16.el9_0.2.s390x", "product_id": "libkadm5-0:1.19.1-16.el9_0.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.19.1-16.el9_0.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x", "product": { "name": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x", "product_id": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.19.1-16.el9_0.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "product": { "name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "product_id": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.19.1-16.el9_0.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x", "product": { "name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x", "product_id": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.19.1-16.el9_0.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x", "product": { "name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x", "product_id": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.19.1-16.el9_0.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x", "product": { "name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x", "product_id": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.19.1-16.el9_0.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x", "product": { "name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x", "product_id": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.19.1-16.el9_0.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x", "product": { "name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x", "product_id": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.19.1-16.el9_0.2?arch=s390x" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "product": { "name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "product_id": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.19.1-16.el9_0.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-devel-0:1.19.1-16.el9_0.2.s390x", "product": { "name": "krb5-devel-0:1.19.1-16.el9_0.2.s390x", "product_id": "krb5-devel-0:1.19.1-16.el9_0.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.19.1-16.el9_0.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.19.1-16.el9_0.2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src" }, "product_reference": "krb5-0:1.19.1-16.el9_0.2.src", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-server-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "krb5-server-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-server-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-server-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "libkadm5-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "libkadm5-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "libkadm5-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "libkadm5-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.19.1-16.el9_0.2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src" }, "product_reference": "krb5-0:1.19.1-16.el9_0.2.src", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-devel-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-libs-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-server-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "krb5-server-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-server-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-server-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-server-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-workstation-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "libkadm5-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "libkadm5-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "libkadm5-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "libkadm5-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "libkadm5-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64" }, "product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686" }, "product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le" }, "product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x" }, "product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)", "product_id": "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64" }, "product_reference": "libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "discovery_date": "2024-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2263240" } ], "notes": [ { "category": "description", "text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.", "title": "Vulnerability description" }, { "category": "summary", "text": "freeradius: forgery attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src", "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src", "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-3596" }, { "category": "external", "summary": "RHBZ#2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/", "url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/html/rfc2865", "url": "https://datatracker.ietf.org/doc/html/rfc2865" }, { "category": "external", "summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf", "url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf" }, { "category": "external", "summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt", "url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt" }, { "category": "external", "summary": "https://www.blastradius.fail/", "url": "https://www.blastradius.fail/" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/456537", "url": "https://www.kb.cert.org/vuls/id/456537" } ], "release_date": "2024-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-29T18:51:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src", "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src", "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8577" }, { "category": "workaround", "details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.", "product_ids": [ "AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src", "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src", "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src", "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64", "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686", "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "AppStream-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-0:1.19.1-16.el9_0.2.src", "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-debugsource-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-devel-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-libs-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-libs-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-pkinit-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-server-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-server-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-workstation-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:krb5-workstation-debuginfo-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:libkadm5-0:1.19.1-16.el9_0.2.x86_64", "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.aarch64", "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.i686", "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.ppc64le", "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.s390x", "BaseOS-9.0.0.Z.E4S:libkadm5-debuginfo-0:1.19.1-16.el9_0.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freeradius: forgery attack" } ] }
rhsa-2024_4935
Vulnerability from csaf_redhat
Published
2024-07-31 10:40
Modified
2024-11-13 16:38
Summary
Red Hat Security Advisory: freeradius security update
Notes
Topic
An update for freeradius is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for freeradius is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4935", "url": "https://access.redhat.com/errata/RHSA-2024:4935" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4935.json" } ], "title": "Red Hat Security Advisory: freeradius security update", "tracking": { "current_release_date": "2024-11-13T16:38:35+00:00", "generator": { "date": "2024-11-13T16:38:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2024:4935", "initial_release_date": "2024-07-31T10:40:25+00:00", "revision_history": [ { "date": "2024-07-31T10:40:25+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-31T10:40:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T16:38:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux CRB (v. 9)", "product": { "name": "Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.21-40.el9_4.src", "product": { "name": "freeradius-0:3.0.21-40.el9_4.src", "product_id": "freeradius-0:3.0.21-40.el9_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.21-40.el9_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.21-40.el9_4.aarch64", "product": { "name": "freeradius-0:3.0.21-40.el9_4.aarch64", "product_id": "freeradius-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.21-40.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.21-40.el9_4.aarch64", "product": { "name": "freeradius-devel-0:3.0.21-40.el9_4.aarch64", "product_id": "freeradius-devel-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-40.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.21-40.el9_4.aarch64", "product": { "name": "freeradius-doc-0:3.0.21-40.el9_4.aarch64", "product_id": "freeradius-doc-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-40.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64", "product": { "name": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64", "product_id": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-40.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64", "product": { "name": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64", "product_id": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-40.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.21-40.el9_4.aarch64", "product": { "name": "freeradius-utils-0:3.0.21-40.el9_4.aarch64", "product_id": "freeradius-utils-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-40.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.21-40.el9_4.aarch64", "product": { "name": "python3-freeradius-0:3.0.21-40.el9_4.aarch64", "product_id": "python3-freeradius-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-40.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64", "product": { "name": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64", "product_id": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-40.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "product": { "name": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "product_id": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-40.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64", "product_id": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-40.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64", "product_id": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-40.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64", "product_id": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-40.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64", "product": { "name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64", "product_id": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-40.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64", "product_id": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-40.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64", "product": { "name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64", "product_id": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-40.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64", "product_id": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-40.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-40.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64", "product": { "name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64", "product_id": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-40.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "product": { "name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "product_id": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-40.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64", "product": { "name": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64", "product_id": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-40.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.21-40.el9_4.aarch64", "product": { "name": "freeradius-perl-0:3.0.21-40.el9_4.aarch64", "product_id": "freeradius-perl-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-40.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64", "product": { "name": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64", "product_id": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-40.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-rest-0:3.0.21-40.el9_4.aarch64", "product": { "name": "freeradius-rest-0:3.0.21-40.el9_4.aarch64", "product_id": "freeradius-rest-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-40.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64", "product": { "name": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64", "product_id": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-40.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64", "product": { "name": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64", "product_id": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-40.el9_4?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "freeradius-0:3.0.21-40.el9_4.ppc64le", "product_id": "freeradius-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.21-40.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le", "product_id": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-40.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le", "product_id": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-40.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le", "product_id": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-40.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le", "product_id": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-40.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le", "product_id": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-40.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le", "product_id": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-40.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le", "product_id": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-40.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product_id": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-40.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product_id": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-40.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product_id": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-40.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product_id": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-40.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product_id": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-40.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product_id": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-40.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product_id": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-40.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product_id": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-40.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-40.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product_id": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-40.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product_id": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-40.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le", "product_id": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-40.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le", "product_id": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-40.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le", "product_id": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-40.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le", "product_id": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-40.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le", "product_id": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-40.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le", "product": { "name": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le", "product_id": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-40.el9_4?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.21-40.el9_4.x86_64", "product": { "name": "freeradius-0:3.0.21-40.el9_4.x86_64", "product_id": "freeradius-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.21-40.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.21-40.el9_4.x86_64", "product": { "name": "freeradius-devel-0:3.0.21-40.el9_4.x86_64", "product_id": "freeradius-devel-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-40.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.21-40.el9_4.x86_64", "product": { "name": "freeradius-doc-0:3.0.21-40.el9_4.x86_64", "product_id": "freeradius-doc-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-40.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64", "product": { "name": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64", "product_id": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-40.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64", "product": { "name": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64", "product_id": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-40.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.21-40.el9_4.x86_64", "product": { "name": "freeradius-utils-0:3.0.21-40.el9_4.x86_64", "product_id": "freeradius-utils-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-40.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.21-40.el9_4.x86_64", "product": { "name": "python3-freeradius-0:3.0.21-40.el9_4.x86_64", "product_id": "python3-freeradius-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-40.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64", "product": { "name": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64", "product_id": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-40.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64", "product": { "name": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64", "product_id": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-40.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64", "product_id": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-40.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64", "product_id": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-40.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64", "product_id": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-40.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64", "product": { "name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64", "product_id": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-40.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64", "product_id": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-40.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64", "product": { "name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64", "product_id": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-40.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64", "product_id": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-40.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-40.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64", "product": { "name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64", "product_id": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-40.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64", "product": { "name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64", "product_id": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-40.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64", "product": { "name": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64", "product_id": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-40.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.21-40.el9_4.x86_64", "product": { "name": "freeradius-perl-0:3.0.21-40.el9_4.x86_64", "product_id": "freeradius-perl-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-40.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64", "product": { "name": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64", "product_id": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-40.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-rest-0:3.0.21-40.el9_4.x86_64", "product": { "name": "freeradius-rest-0:3.0.21-40.el9_4.x86_64", "product_id": "freeradius-rest-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-40.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64", "product": { "name": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64", "product_id": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-40.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64", "product": { "name": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64", "product_id": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-40.el9_4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.21-40.el9_4.s390x", "product": { "name": "freeradius-0:3.0.21-40.el9_4.s390x", "product_id": "freeradius-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.21-40.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.21-40.el9_4.s390x", "product": { "name": "freeradius-devel-0:3.0.21-40.el9_4.s390x", "product_id": "freeradius-devel-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.21-40.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.21-40.el9_4.s390x", "product": { "name": "freeradius-doc-0:3.0.21-40.el9_4.s390x", "product_id": "freeradius-doc-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.21-40.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.21-40.el9_4.s390x", "product": { "name": "freeradius-krb5-0:3.0.21-40.el9_4.s390x", "product_id": "freeradius-krb5-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.21-40.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.21-40.el9_4.s390x", "product": { "name": "freeradius-ldap-0:3.0.21-40.el9_4.s390x", "product_id": "freeradius-ldap-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.21-40.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.21-40.el9_4.s390x", "product": { "name": "freeradius-utils-0:3.0.21-40.el9_4.s390x", "product_id": "freeradius-utils-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.21-40.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.21-40.el9_4.s390x", "product": { "name": "python3-freeradius-0:3.0.21-40.el9_4.s390x", "product_id": "python3-freeradius-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.21-40.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x", "product": { "name": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x", "product_id": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.21-40.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "product": { "name": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "product_id": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.21-40.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x", "product_id": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.21-40.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x", "product_id": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.21-40.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x", "product_id": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.21-40.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x", "product": { "name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x", "product_id": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.21-40.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x", "product_id": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.21-40.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x", "product": { "name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x", "product_id": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.21-40.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x", "product_id": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.21-40.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.21-40.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x", "product": { "name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x", "product_id": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.21-40.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "product": { "name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "product_id": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.21-40.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-mysql-0:3.0.21-40.el9_4.s390x", "product": { "name": "freeradius-mysql-0:3.0.21-40.el9_4.s390x", "product_id": "freeradius-mysql-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.21-40.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.21-40.el9_4.s390x", "product": { "name": "freeradius-perl-0:3.0.21-40.el9_4.s390x", "product_id": "freeradius-perl-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.21-40.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x", "product": { "name": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x", "product_id": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.21-40.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-rest-0:3.0.21-40.el9_4.s390x", "product": { "name": "freeradius-rest-0:3.0.21-40.el9_4.s390x", "product_id": "freeradius-rest-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest@3.0.21-40.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x", "product": { "name": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x", "product_id": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.21-40.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x", "product": { "name": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x", "product_id": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.21-40.el9_4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-40.el9_4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src" }, "product_reference": "freeradius-0:3.0.21-40.el9_4.src", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-devel-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-devel-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-devel-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-doc-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-doc-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-doc-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-perl-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-perl-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-perl-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-rest-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-rest-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-rest-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-utils-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-utils-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-utils-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "python3-freeradius-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x" }, "product_reference": "python3-freeradius-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "python3-freeradius-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-40.el9_4.src as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src" }, "product_reference": "freeradius-0:3.0.21-40.el9_4.src", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-debugsource-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-devel-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-devel-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-devel-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-devel-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-doc-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-doc-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-doc-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-doc-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-krb5-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-ldap-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-mysql-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-perl-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-perl-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-perl-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-perl-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-postgresql-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-rest-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-rest-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-rest-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-rest-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-sqlite-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-utils-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-utils-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-utils-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-utils-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "python3-freeradius-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "python3-freeradius-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x" }, "product_reference": "python3-freeradius-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "python3-freeradius-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64", "relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "discovery_date": "2024-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2263240" } ], "notes": [ { "category": "description", "text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.", "title": "Vulnerability description" }, { "category": "summary", "text": "freeradius: forgery attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src", "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-3596" }, { "category": "external", "summary": "RHBZ#2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/", "url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/html/rfc2865", "url": "https://datatracker.ietf.org/doc/html/rfc2865" }, { "category": "external", "summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf", "url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf" }, { "category": "external", "summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt", "url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt" }, { "category": "external", "summary": "https://www.blastradius.fail/", "url": "https://www.blastradius.fail/" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/456537", "url": "https://www.kb.cert.org/vuls/id/456537" } ], "release_date": "2024-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T10:40:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src", "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4935" }, { "category": "workaround", "details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src", "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.src", "CRB-9.4.0.Z.MAIN.EUS:freeradius-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-debugsource-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-devel-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-doc-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-krb5-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-ldap-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-mysql-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-perl-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-postgresql-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-rest-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-sqlite-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-unixODBC-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:freeradius-utils-debuginfo-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-0:3.0.21-40.el9_4.x86_64", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.aarch64", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.ppc64le", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.s390x", "CRB-9.4.0.Z.MAIN.EUS:python3-freeradius-debuginfo-0:3.0.21-40.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freeradius: forgery attack" } ] }
rhsa-2024_8791
Vulnerability from csaf_redhat
Published
2024-11-04 01:28
Modified
2024-11-13 16:37
Summary
Red Hat Security Advisory: krb5 security update
Notes
Topic
An update for krb5 is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8791", "url": "https://access.redhat.com/errata/RHSA-2024:8791" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8791.json" } ], "title": "Red Hat Security Advisory: krb5 security update", "tracking": { "current_release_date": "2024-11-13T16:37:32+00:00", "generator": { "date": "2024-11-13T16:37:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2024:8791", "initial_release_date": "2024-11-04T01:28:32+00:00", "revision_history": [ { "date": "2024-11-04T01:28:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-04T01:28:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T16:37:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:8.4::baseos" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product": { "name": "Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:8.4::baseos" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:8.4::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "krb5-0:1.18.2-9.el8_4.2.src", "product": { "name": "krb5-0:1.18.2-9.el8_4.2.src", "product_id": "krb5-0:1.18.2-9.el8_4.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5@1.18.2-9.el8_4.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.18.2-9.el8_4.2.i686", "product": { "name": "krb5-devel-0:1.18.2-9.el8_4.2.i686", "product_id": "krb5-devel-0:1.18.2-9.el8_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-9.el8_4.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-libs-0:1.18.2-9.el8_4.2.i686", "product": { "name": "krb5-libs-0:1.18.2-9.el8_4.2.i686", "product_id": "krb5-libs-0:1.18.2-9.el8_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-9.el8_4.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686", "product": { "name": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686", "product_id": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-9.el8_4.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-0:1.18.2-9.el8_4.2.i686", "product": { "name": "krb5-server-0:1.18.2-9.el8_4.2.i686", "product_id": "krb5-server-0:1.18.2-9.el8_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.18.2-9.el8_4.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686", "product": { "name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686", "product_id": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-9.el8_4.2?arch=i686" } } }, { "category": "product_version", "name": "libkadm5-0:1.18.2-9.el8_4.2.i686", "product": { "name": "libkadm5-0:1.18.2-9.el8_4.2.i686", "product_id": "libkadm5-0:1.18.2-9.el8_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.18.2-9.el8_4.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686", "product": { "name": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686", "product_id": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-9.el8_4.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686", "product": { "name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686", "product_id": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-9.el8_4.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686", "product": { "name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686", "product_id": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-9.el8_4.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686", "product": { "name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686", "product_id": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-9.el8_4.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686", "product": { "name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686", "product_id": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-9.el8_4.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686", "product": { "name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686", "product_id": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-9.el8_4.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686", "product": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686", "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-9.el8_4.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686", "product": { "name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686", "product_id": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-9.el8_4.2?arch=i686" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686", "product": { "name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686", "product_id": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-9.el8_4.2?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64", "product": { "name": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64", "product_id": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-9.el8_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64", "product": { "name": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64", "product_id": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-9.el8_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64", "product": { "name": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64", "product_id": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-9.el8_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-0:1.18.2-9.el8_4.2.x86_64", "product": { "name": "krb5-server-0:1.18.2-9.el8_4.2.x86_64", "product_id": "krb5-server-0:1.18.2-9.el8_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.18.2-9.el8_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64", "product": { "name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64", "product_id": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-9.el8_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64", "product": { "name": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64", "product_id": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-9.el8_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "libkadm5-0:1.18.2-9.el8_4.2.x86_64", "product": { "name": "libkadm5-0:1.18.2-9.el8_4.2.x86_64", "product_id": "libkadm5-0:1.18.2-9.el8_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.18.2-9.el8_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64", "product": { "name": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64", "product_id": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-9.el8_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "product": { "name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "product_id": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-9.el8_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "product": { "name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "product_id": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-9.el8_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "product": { "name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "product_id": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-9.el8_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "product": { "name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "product_id": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-9.el8_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "product": { "name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "product_id": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-9.el8_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "product": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-9.el8_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "product": { "name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "product_id": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-9.el8_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "product": { "name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "product_id": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-9.el8_4.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.18.2-9.el8_4.2.ppc64le", "product": { "name": "krb5-devel-0:1.18.2-9.el8_4.2.ppc64le", "product_id": "krb5-devel-0:1.18.2-9.el8_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-9.el8_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-libs-0:1.18.2-9.el8_4.2.ppc64le", "product": { "name": "krb5-libs-0:1.18.2-9.el8_4.2.ppc64le", "product_id": "krb5-libs-0:1.18.2-9.el8_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-9.el8_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le", "product": { "name": "krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le", "product_id": "krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-9.el8_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-0:1.18.2-9.el8_4.2.ppc64le", "product": { "name": "krb5-server-0:1.18.2-9.el8_4.2.ppc64le", "product_id": "krb5-server-0:1.18.2-9.el8_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.18.2-9.el8_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le", "product": { "name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le", "product_id": "krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-9.el8_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le", "product": { "name": "krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le", "product_id": "krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-9.el8_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "libkadm5-0:1.18.2-9.el8_4.2.ppc64le", "product": { "name": "libkadm5-0:1.18.2-9.el8_4.2.ppc64le", "product_id": "libkadm5-0:1.18.2-9.el8_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.18.2-9.el8_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le", "product": { "name": "krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le", "product_id": "krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-9.el8_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "product": { "name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "product_id": "krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "product": { "name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "product_id": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "product": { "name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "product_id": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "product": { "name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "product_id": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "product": { "name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "product_id": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "product": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "product": { "name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "product_id": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "product": { "name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "product_id": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-9.el8_4.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.18.2-9.el8_4.2.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.2.src" }, "product_reference": "krb5-0:1.18.2-9.el8_4.2.src", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-server-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-server-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "libkadm5-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "libkadm5-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.18.2-9.el8_4.2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.2.src" }, "product_reference": "krb5-0:1.18.2-9.el8_4.2.src", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le" }, "product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le" }, "product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.ppc64le" }, "product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.ppc64le" }, "product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le" }, "product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-server-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.ppc64le" }, "product_reference": "krb5-server-0:1.18.2-9.el8_4.2.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-server-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le" }, "product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le" }, "product_reference": "krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "libkadm5-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.ppc64le" }, "product_reference": "libkadm5-0:1.18.2-9.el8_4.2.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "libkadm5-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.4)", "product_id": "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.18.2-9.el8_4.2.src as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.2.src" }, "product_reference": "krb5-0:1.18.2-9.el8_4.2.src", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-devel-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-libs-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-server-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-server-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-workstation-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "libkadm5-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "libkadm5-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "discovery_date": "2024-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2263240" } ], "notes": [ { "category": "description", "text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.", "title": "Vulnerability description" }, { "category": "summary", "text": "freeradius: forgery attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.2.src", "BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.2.src", "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.2.src", "BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-3596" }, { "category": "external", "summary": "RHBZ#2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/", "url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/html/rfc2865", "url": "https://datatracker.ietf.org/doc/html/rfc2865" }, { "category": "external", "summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf", "url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf" }, { "category": "external", "summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt", "url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt" }, { "category": "external", "summary": "https://www.blastradius.fail/", "url": "https://www.blastradius.fail/" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/456537", "url": "https://www.kb.cert.org/vuls/id/456537" } ], "release_date": "2024-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T01:28:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.2.src", "BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.2.src", "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.2.src", "BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8791" }, { "category": "workaround", "details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.", "product_ids": [ "BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.2.src", "BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.2.src", "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.2.src", "BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.Z.AUS:krb5-0:1.18.2-9.el8_4.2.src", "BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-0:1.18.2-9.el8_4.2.src", "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-devel-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-libs-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-server-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:libkadm5-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.ppc64le", "BaseOS-8.4.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-0:1.18.2-9.el8_4.2.src", "BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-debugsource-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-devel-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-libs-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-pkinit-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-server-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-workstation-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:libkadm5-0:1.18.2-9.el8_4.2.x86_64", "BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.i686", "BaseOS-8.4.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-9.el8_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freeradius: forgery attack" } ] }
rhsa-2024_4911
Vulnerability from csaf_redhat
Published
2024-07-30 09:01
Modified
2024-11-13 16:38
Summary
Red Hat Security Advisory: freeradius security update
Notes
Topic
An update for freeradius is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for freeradius is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4911", "url": "https://access.redhat.com/errata/RHSA-2024:4911" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4911.json" } ], "title": "Red Hat Security Advisory: freeradius security update", "tracking": { "current_release_date": "2024-11-13T16:38:14+00:00", "generator": { "date": "2024-11-13T16:38:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2024:4911", "initial_release_date": "2024-07-30T09:01:51+00:00", "revision_history": [ { "date": "2024-07-30T09:01:51+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-30T09:01:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T16:38:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7 ELS)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-1.el7_9.1.src", "product": { "name": "freeradius-0:3.0.20-1.el7_9.1.src", "product_id": "freeradius-0:3.0.20-1.el7_9.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-1.el7_9.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-1.el7_9.1.ppc64", "product": { "name": "freeradius-0:3.0.20-1.el7_9.1.ppc64", "product_id": "freeradius-0:3.0.20-1.el7_9.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-1.el7_9.1?arch=ppc64" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64", "product": { "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64", "product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=ppc64" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64", "product": { "name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64", "product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=ppc64" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64", "product": { "name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64", "product_id": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-1.el7_9.1?arch=ppc64" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64", "product": { "name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64", "product_id": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-1.el7_9.1?arch=ppc64" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64", "product": { "name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64", "product_id": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-1.el7_9.1?arch=ppc64" } } }, { "category": "product_version", "name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64", "product": { "name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64", "product_id": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-1.el7_9.1?arch=ppc64" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64", "product": { "name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64", "product_id": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-1.el7_9.1?arch=ppc64" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64", "product": { "name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64", "product_id": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-1.el7_9.1?arch=ppc64" } } }, { "category": "product_version", "name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64", "product": { "name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64", "product_id": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-python@3.0.20-1.el7_9.1?arch=ppc64" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64", "product": { "name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64", "product_id": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-1.el7_9.1?arch=ppc64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64", "product": { "name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64", "product_id": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-1.el7_9.1?arch=ppc64" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64", "product": { "name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64", "product_id": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-1.el7_9.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-1.el7_9.1.ppc64le", "product": { "name": "freeradius-0:3.0.20-1.el7_9.1.ppc64le", "product_id": "freeradius-0:3.0.20-1.el7_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-1.el7_9.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le", "product": { "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le", "product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le", "product": { "name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le", "product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le", "product": { "name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le", "product_id": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-1.el7_9.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le", "product": { "name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le", "product_id": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-1.el7_9.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le", "product": { "name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le", "product_id": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-1.el7_9.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le", "product": { "name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le", "product_id": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-1.el7_9.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le", "product": { "name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le", "product_id": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-1.el7_9.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le", "product": { "name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le", "product_id": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-1.el7_9.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le", "product": { "name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le", "product_id": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-python@3.0.20-1.el7_9.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le", "product": { "name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le", "product_id": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-1.el7_9.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le", "product": { "name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le", "product_id": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-1.el7_9.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le", "product": { "name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le", "product_id": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-1.el7_9.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-1.el7_9.1.s390x", "product": { "name": "freeradius-0:3.0.20-1.el7_9.1.s390x", "product_id": "freeradius-0:3.0.20-1.el7_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-1.el7_9.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x", "product": { "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x", "product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x", "product": { "name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x", "product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x", "product": { "name": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x", "product_id": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-1.el7_9.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x", "product": { "name": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x", "product_id": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-1.el7_9.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x", "product": { "name": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x", "product_id": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-1.el7_9.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x", "product": { "name": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x", "product_id": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-1.el7_9.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x", "product": { "name": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x", "product_id": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-1.el7_9.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x", "product": { "name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x", "product_id": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-1.el7_9.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-python-0:3.0.20-1.el7_9.1.s390x", "product": { "name": "freeradius-python-0:3.0.20-1.el7_9.1.s390x", "product_id": "freeradius-python-0:3.0.20-1.el7_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-python@3.0.20-1.el7_9.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x", "product": { "name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x", "product_id": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-1.el7_9.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x", "product": { "name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x", "product_id": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-1.el7_9.1?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x", "product": { "name": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x", "product_id": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-1.el7_9.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-1.el7_9.1.x86_64", "product": { "name": "freeradius-0:3.0.20-1.el7_9.1.x86_64", "product_id": "freeradius-0:3.0.20-1.el7_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-1.el7_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64", "product": { "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64", "product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64", "product": { "name": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64", "product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64", "product": { "name": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64", "product_id": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-1.el7_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64", "product": { "name": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64", "product_id": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-1.el7_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64", "product": { "name": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64", "product_id": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-1.el7_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64", "product": { "name": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64", "product_id": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-1.el7_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64", "product": { "name": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64", "product_id": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-1.el7_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64", "product": { "name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64", "product_id": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-1.el7_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64", "product": { "name": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64", "product_id": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-python@3.0.20-1.el7_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64", "product": { "name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64", "product_id": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-1.el7_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64", "product": { "name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64", "product_id": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-1.el7_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64", "product": { "name": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64", "product_id": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-1.el7_9.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "freeradius-devel-0:3.0.20-1.el7_9.1.i686", "product": { "name": "freeradius-devel-0:3.0.20-1.el7_9.1.i686", "product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=i686" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686", "product": { "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686", "product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc", "product": { "name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc", "product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=ppc" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc", "product": { "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc", "product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390", "product": { "name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390", "product_id": "freeradius-devel-0:3.0.20-1.el7_9.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-1.el7_9.1?arch=s390" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390", "product": { "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390", "product_id": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-1.el7_9.1?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-1.el7_9.1.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.src" }, "product_reference": "freeradius-0:3.0.20-1.el7_9.1.src", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686" }, "product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc" }, "product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390" }, "product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-1.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686" }, "product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.i686", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc" }, "product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390" }, "product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.s390", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-python-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-1.el7_9.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.src" }, "product_reference": "freeradius-0:3.0.20-1.el7_9.1.src", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686" }, "product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc" }, "product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390" }, "product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-1.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686" }, "product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.i686", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc" }, "product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390" }, "product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.s390", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-devel-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-doc-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-perl-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-python-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-python-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64" }, "product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le" }, "product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x" }, "product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64" }, "product_reference": "freeradius-utils-0:3.0.20-1.el7_9.1.x86_64", "relates_to_product_reference": "7Server-optional-ELS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "discovery_date": "2024-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2263240" } ], "notes": [ { "category": "description", "text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.", "title": "Vulnerability description" }, { "category": "summary", "text": "freeradius: forgery attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.src", "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.src", "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-3596" }, { "category": "external", "summary": "RHBZ#2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/", "url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/html/rfc2865", "url": "https://datatracker.ietf.org/doc/html/rfc2865" }, { "category": "external", "summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf", "url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf" }, { "category": "external", "summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt", "url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt" }, { "category": "external", "summary": "https://www.blastradius.fail/", "url": "https://www.blastradius.fail/" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/456537", "url": "https://www.kb.cert.org/vuls/id/456537" } ], "release_date": "2024-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-30T09:01:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.src", "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.src", "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4911" }, { "category": "workaround", "details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.", "product_ids": [ "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.src", "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.src", "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.src", "7Server-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64", "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64", "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le", "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x", "7Server-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.src", "7Server-optional-ELS:freeradius-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.i686", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-debuginfo-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.i686", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-devel-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-doc-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-krb5-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-ldap-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-mysql-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-perl-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-postgresql-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-python-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-sqlite-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-unixODBC-0:3.0.20-1.el7_9.1.x86_64", "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64", "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.ppc64le", "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.s390x", "7Server-optional-ELS:freeradius-utils-0:3.0.20-1.el7_9.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freeradius: forgery attack" } ] }
rhsa-2024_4874
Vulnerability from csaf_redhat
Published
2024-07-25 15:53
Modified
2024-11-13 16:37
Summary
Red Hat Security Advisory: freeradius:3.0 security update
Notes
Topic
An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.4 Telecommunications Update Service, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.4 Telecommunications Update Service, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4874", "url": "https://access.redhat.com/errata/RHSA-2024:4874" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4874.json" } ], "title": "Red Hat Security Advisory: freeradius:3.0 security update", "tracking": { "current_release_date": "2024-11-13T16:37:52+00:00", "generator": { "date": "2024-11-13T16:37:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2024:4874", "initial_release_date": "2024-07-25T15:53:18+00:00", "revision_history": [ { "date": "2024-07-25T15:53:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-25T15:53:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T16:37:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "freeradius:3.0:8040020240719063921:9ab73fbf", "product": { "name": "freeradius:3.0:8040020240719063921:9ab73fbf", "product_id": "freeradius:3.0:8040020240719063921:9ab73fbf", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/freeradius@3.0:8040020240719063921:9ab73fbf" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src", "product": { "name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src", "product_id": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product": { "name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_id": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product": { "name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_id": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-4.module%2Bel8.4.0%2B22088%2B2692c5cc.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, "product_reference": "freeradius:3.0:8040020240719063921:9ab73fbf", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src" }, "product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, "product_reference": "freeradius:3.0:8040020240719063921:9ab73fbf", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src" }, "product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, "product_reference": "freeradius:3.0:8040020240719063921:9ab73fbf", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src" }, "product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64 as a component of freeradius:3.0:8040020240719063921:9ab73fbf as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "discovery_date": "2024-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2263240" } ], "notes": [ { "category": "description", "text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.", "title": "Vulnerability description" }, { "category": "summary", "text": "freeradius: forgery attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-3596" }, { "category": "external", "summary": "RHBZ#2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/", "url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/html/rfc2865", "url": "https://datatracker.ietf.org/doc/html/rfc2865" }, { "category": "external", "summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf", "url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf" }, { "category": "external", "summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt", "url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt" }, { "category": "external", "summary": "https://www.blastradius.fail/", "url": "https://www.blastradius.fail/" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/456537", "url": "https://www.kb.cert.org/vuls/id/456537" } ], "release_date": "2024-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-25T15:53:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4874" }, { "category": "workaround", "details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.", "product_ids": [ "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.AUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.ppc64le", "AppStream-8.4.0.Z.E4S:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.src", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-debugsource-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-devel-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-doc-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-krb5-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-ldap-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-mysql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-perl-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-postgresql-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-rest-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-sqlite-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-unixODBC-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:freeradius-utils-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64", "AppStream-8.4.0.Z.TUS:freeradius:3.0:8040020240719063921:9ab73fbf:python3-freeradius-debuginfo-0:3.0.20-4.module+el8.4.0+22088+2692c5cc.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freeradius: forgery attack" } ] }
rhsa-2024_9547
Vulnerability from csaf_redhat
Published
2024-11-13 15:58
Modified
2024-11-21 19:46
Summary
Red Hat Security Advisory: krb5 security update
Notes
Topic
An update for krb5 is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for krb5 is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:9547", "url": "https://access.redhat.com/errata/RHSA-2024:9547" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9547.json" } ], "title": "Red Hat Security Advisory: krb5 security update", "tracking": { "current_release_date": "2024-11-21T19:46:19+00:00", "generator": { "date": "2024-11-21T19:46:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:9547", "initial_release_date": "2024-11-13T15:58:23+00:00", "revision_history": [ { "date": "2024-11-13T15:58:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-13T15:58:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T19:46:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:9.4::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64", "product": { "name": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64", "product_id": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4.1?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64", "product": { "name": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64", "product_id": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4.1?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "product": { "name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4.1?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "product": { "name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4.1?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "product": { "name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4.1?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "product": { "name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4.1?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "product": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4.1?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "product": { "name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4.1?arch=aarch64" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "product": { "name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4.1?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64", "product": { "name": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64", "product_id": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4.1?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64", "product": { "name": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64", "product_id": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4.1?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-0:1.21.1-2.el9_4.1.aarch64", "product": { "name": "krb5-server-0:1.21.1-2.el9_4.1.aarch64", "product_id": "krb5-server-0:1.21.1-2.el9_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4.1?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64", "product": { "name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64", "product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4.1?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64", "product": { "name": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64", "product_id": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-2.el9_4.1?arch=aarch64" } } }, { "category": "product_version", "name": "libkadm5-0:1.21.1-2.el9_4.1.aarch64", "product": { "name": "libkadm5-0:1.21.1-2.el9_4.1.aarch64", "product_id": "libkadm5-0:1.21.1-2.el9_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4.1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le", "product": { "name": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le", "product_id": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4.1?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le", "product": { "name": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le", "product_id": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4.1?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "product": { "name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "product": { "name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "product": { "name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "product": { "name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "product": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "product": { "name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "product": { "name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4.1?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le", "product": { "name": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le", "product_id": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4.1?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le", "product": { "name": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le", "product_id": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4.1?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le", "product": { "name": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le", "product_id": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4.1?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le", "product": { "name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le", "product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4.1?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le", "product": { "name": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le", "product_id": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-2.el9_4.1?arch=ppc64le" } } }, { "category": "product_version", "name": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le", "product": { "name": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le", "product_id": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.21.1-2.el9_4.1.i686", "product": { "name": "krb5-devel-0:1.21.1-2.el9_4.1.i686", "product_id": "krb5-devel-0:1.21.1-2.el9_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4.1?arch=i686" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686", "product": { "name": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686", "product_id": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4.1?arch=i686" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686", "product": { "name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686", "product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4.1?arch=i686" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686", "product": { "name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686", "product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4.1?arch=i686" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686", "product": { "name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686", "product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4.1?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686", "product": { "name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686", "product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4.1?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686", "product": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686", "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4.1?arch=i686" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686", "product": { "name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686", "product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4.1?arch=i686" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686", "product": { "name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686", "product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4.1?arch=i686" } } }, { "category": "product_version", "name": "krb5-libs-0:1.21.1-2.el9_4.1.i686", "product": { "name": "krb5-libs-0:1.21.1-2.el9_4.1.i686", "product_id": "krb5-libs-0:1.21.1-2.el9_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4.1?arch=i686" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686", "product": { "name": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686", "product_id": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4.1?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-0:1.21.1-2.el9_4.1.i686", "product": { "name": "krb5-server-0:1.21.1-2.el9_4.1.i686", "product_id": "krb5-server-0:1.21.1-2.el9_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4.1?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686", "product": { "name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686", "product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4.1?arch=i686" } } }, { "category": "product_version", "name": "libkadm5-0:1.21.1-2.el9_4.1.i686", "product": { "name": "libkadm5-0:1.21.1-2.el9_4.1.i686", "product_id": "libkadm5-0:1.21.1-2.el9_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4.1?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64", "product": { "name": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64", "product_id": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64", "product": { "name": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64", "product_id": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "product": { "name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "product": { "name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "product": { "name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "product": { "name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "product": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "product": { "name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "product": { "name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64", "product": { "name": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64", "product_id": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64", "product": { "name": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64", "product_id": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-0:1.21.1-2.el9_4.1.x86_64", "product": { "name": "krb5-server-0:1.21.1-2.el9_4.1.x86_64", "product_id": "krb5-server-0:1.21.1-2.el9_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64", "product": { "name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64", "product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64", "product": { "name": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64", "product_id": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-2.el9_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "libkadm5-0:1.21.1-2.el9_4.1.x86_64", "product": { "name": "libkadm5-0:1.21.1-2.el9_4.1.x86_64", "product_id": "libkadm5-0:1.21.1-2.el9_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.21.1-2.el9_4.1.s390x", "product": { "name": "krb5-devel-0:1.21.1-2.el9_4.1.s390x", "product_id": "krb5-devel-0:1.21.1-2.el9_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-2.el9_4.1?arch=s390x" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x", "product": { "name": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x", "product_id": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-2.el9_4.1?arch=s390x" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "product": { "name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "product_id": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-2.el9_4.1?arch=s390x" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x", "product": { "name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x", "product_id": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-2.el9_4.1?arch=s390x" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x", "product": { "name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x", "product_id": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-2.el9_4.1?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x", "product": { "name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x", "product_id": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-2.el9_4.1?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x", "product": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x", "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-2.el9_4.1?arch=s390x" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x", "product": { "name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x", "product_id": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-2.el9_4.1?arch=s390x" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "product": { "name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "product_id": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-2.el9_4.1?arch=s390x" } } }, { "category": "product_version", "name": "krb5-libs-0:1.21.1-2.el9_4.1.s390x", "product": { "name": "krb5-libs-0:1.21.1-2.el9_4.1.s390x", "product_id": "krb5-libs-0:1.21.1-2.el9_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-2.el9_4.1?arch=s390x" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x", "product": { "name": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x", "product_id": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-2.el9_4.1?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-0:1.21.1-2.el9_4.1.s390x", "product": { "name": "krb5-server-0:1.21.1-2.el9_4.1.s390x", "product_id": "krb5-server-0:1.21.1-2.el9_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.21.1-2.el9_4.1?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x", "product": { "name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x", "product_id": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-2.el9_4.1?arch=s390x" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x", "product": { "name": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x", "product_id": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-2.el9_4.1?arch=s390x" } } }, { "category": "product_version", "name": "libkadm5-0:1.21.1-2.el9_4.1.s390x", "product": { "name": "libkadm5-0:1.21.1-2.el9_4.1.s390x", "product_id": "libkadm5-0:1.21.1-2.el9_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.21.1-2.el9_4.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "krb5-0:1.21.1-2.el9_4.1.src", "product": { "name": "krb5-0:1.21.1-2.el9_4.1.src", "product_id": "krb5-0:1.21.1-2.el9_4.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5@1.21.1-2.el9_4.1?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.21.1-2.el9_4.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src" }, "product_reference": "krb5-0:1.21.1-2.el9_4.1.src", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-server-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "krb5-server-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-server-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-server-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "libkadm5-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "libkadm5-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "libkadm5-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "libkadm5-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.21.1-2.el9_4.1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src" }, "product_reference": "krb5-0:1.21.1-2.el9_4.1.src", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-devel-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-libs-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-server-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "krb5-server-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-server-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-server-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-server-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-workstation-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "libkadm5-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "libkadm5-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "libkadm5-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "libkadm5-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "libkadm5-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64" }, "product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686" }, "product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le" }, "product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x" }, "product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)", "product_id": "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64" }, "product_reference": "libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "relates_to_product_reference": "BaseOS-9.4.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "discovery_date": "2024-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2263240" } ], "notes": [ { "category": "description", "text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.", "title": "Vulnerability description" }, { "category": "summary", "text": "freeradius: forgery attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src", "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src", "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-3596" }, { "category": "external", "summary": "RHBZ#2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/", "url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/html/rfc2865", "url": "https://datatracker.ietf.org/doc/html/rfc2865" }, { "category": "external", "summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf", "url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf" }, { "category": "external", "summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt", "url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt" }, { "category": "external", "summary": "https://www.blastradius.fail/", "url": "https://www.blastradius.fail/" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/456537", "url": "https://www.kb.cert.org/vuls/id/456537" } ], "release_date": "2024-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T15:58:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src", "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src", "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9547" }, { "category": "workaround", "details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.", "product_ids": [ "AppStream-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src", "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src", "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src", "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64", "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686", "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "AppStream-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-0:1.21.1-2.el9_4.1.src", "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-debugsource-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-devel-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-libs-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-libs-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-pkinit-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-server-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-server-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-workstation-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:krb5-workstation-debuginfo-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:libkadm5-0:1.21.1-2.el9_4.1.x86_64", "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.aarch64", "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.i686", "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.ppc64le", "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.s390x", "BaseOS-9.4.0.Z.EUS:libkadm5-debuginfo-0:1.21.1-2.el9_4.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freeradius: forgery attack" } ] }
rhsa-2024_8794
Vulnerability from csaf_redhat
Published
2024-11-04 01:44
Modified
2024-11-13 16:37
Summary
Red Hat Security Advisory: krb5 security update
Notes
Topic
An update for krb5 is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8794", "url": "https://access.redhat.com/errata/RHSA-2024:8794" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8794.json" } ], "title": "Red Hat Security Advisory: krb5 security update", "tracking": { "current_release_date": "2024-11-13T16:37:52+00:00", "generator": { "date": "2024-11-13T16:37:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2024:8794", "initial_release_date": "2024-11-04T01:44:12+00:00", "revision_history": [ { "date": "2024-11-04T01:44:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-04T01:44:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T16:37:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:8.6::baseos" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product": { "name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:8.6::baseos" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:8.6::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "krb5-0:1.18.2-16.el8_6.2.src", "product": { "name": "krb5-0:1.18.2-16.el8_6.2.src", "product_id": "krb5-0:1.18.2-16.el8_6.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5@1.18.2-16.el8_6.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.18.2-16.el8_6.2.i686", "product": { "name": "krb5-devel-0:1.18.2-16.el8_6.2.i686", "product_id": "krb5-devel-0:1.18.2-16.el8_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-16.el8_6.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-libs-0:1.18.2-16.el8_6.2.i686", "product": { "name": "krb5-libs-0:1.18.2-16.el8_6.2.i686", "product_id": "krb5-libs-0:1.18.2-16.el8_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-16.el8_6.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686", "product": { "name": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686", "product_id": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-16.el8_6.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-0:1.18.2-16.el8_6.2.i686", "product": { "name": "krb5-server-0:1.18.2-16.el8_6.2.i686", "product_id": "krb5-server-0:1.18.2-16.el8_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.18.2-16.el8_6.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686", "product": { "name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686", "product_id": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-16.el8_6.2?arch=i686" } } }, { "category": "product_version", "name": "libkadm5-0:1.18.2-16.el8_6.2.i686", "product": { "name": "libkadm5-0:1.18.2-16.el8_6.2.i686", "product_id": "libkadm5-0:1.18.2-16.el8_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.18.2-16.el8_6.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686", "product": { "name": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686", "product_id": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-16.el8_6.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686", "product": { "name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686", "product_id": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-16.el8_6.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686", "product": { "name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686", "product_id": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-16.el8_6.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686", "product": { "name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686", "product_id": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-16.el8_6.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686", "product": { "name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686", "product_id": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-16.el8_6.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686", "product": { "name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686", "product_id": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-16.el8_6.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686", "product": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686", "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-16.el8_6.2?arch=i686" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686", "product": { "name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686", "product_id": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-16.el8_6.2?arch=i686" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686", "product": { "name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686", "product_id": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-16.el8_6.2?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64", "product": { "name": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64", "product_id": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-16.el8_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64", "product": { "name": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64", "product_id": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-16.el8_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64", "product": { "name": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64", "product_id": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-16.el8_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-0:1.18.2-16.el8_6.2.x86_64", "product": { "name": "krb5-server-0:1.18.2-16.el8_6.2.x86_64", "product_id": "krb5-server-0:1.18.2-16.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.18.2-16.el8_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64", "product": { "name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64", "product_id": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-16.el8_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64", "product": { "name": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64", "product_id": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-16.el8_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "libkadm5-0:1.18.2-16.el8_6.2.x86_64", "product": { "name": "libkadm5-0:1.18.2-16.el8_6.2.x86_64", "product_id": "libkadm5-0:1.18.2-16.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.18.2-16.el8_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64", "product": { "name": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64", "product_id": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-16.el8_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "product": { "name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "product_id": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-16.el8_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "product": { "name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "product_id": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-16.el8_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "product": { "name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "product_id": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-16.el8_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "product": { "name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "product_id": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-16.el8_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "product": { "name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "product_id": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-16.el8_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "product": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-16.el8_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "product": { "name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "product_id": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-16.el8_6.2?arch=x86_64" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "product": { "name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "product_id": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-16.el8_6.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.18.2-16.el8_6.2.aarch64", "product": { "name": "krb5-devel-0:1.18.2-16.el8_6.2.aarch64", "product_id": "krb5-devel-0:1.18.2-16.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-16.el8_6.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.18.2-16.el8_6.2.aarch64", "product": { "name": "krb5-libs-0:1.18.2-16.el8_6.2.aarch64", "product_id": "krb5-libs-0:1.18.2-16.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-16.el8_6.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64", "product": { "name": "krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64", "product_id": "krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-16.el8_6.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-0:1.18.2-16.el8_6.2.aarch64", "product": { "name": "krb5-server-0:1.18.2-16.el8_6.2.aarch64", "product_id": "krb5-server-0:1.18.2-16.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.18.2-16.el8_6.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64", "product": { "name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64", "product_id": "krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-16.el8_6.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.18.2-16.el8_6.2.aarch64", "product": { "name": "krb5-workstation-0:1.18.2-16.el8_6.2.aarch64", "product_id": "krb5-workstation-0:1.18.2-16.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-16.el8_6.2?arch=aarch64" } } }, { "category": "product_version", "name": "libkadm5-0:1.18.2-16.el8_6.2.aarch64", "product": { "name": "libkadm5-0:1.18.2-16.el8_6.2.aarch64", "product_id": "libkadm5-0:1.18.2-16.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.18.2-16.el8_6.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64", "product": { "name": "krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64", "product_id": "krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-16.el8_6.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "product": { "name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "product_id": "krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-16.el8_6.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "product": { "name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "product_id": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-16.el8_6.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "product": { "name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "product_id": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-16.el8_6.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "product": { "name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "product_id": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-16.el8_6.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "product": { "name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "product_id": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-16.el8_6.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "product": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-16.el8_6.2?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "product": { "name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "product_id": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-16.el8_6.2?arch=aarch64" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "product": { "name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "product_id": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-16.el8_6.2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.18.2-16.el8_6.2.ppc64le", "product": { "name": "krb5-devel-0:1.18.2-16.el8_6.2.ppc64le", "product_id": "krb5-devel-0:1.18.2-16.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-16.el8_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-libs-0:1.18.2-16.el8_6.2.ppc64le", "product": { "name": "krb5-libs-0:1.18.2-16.el8_6.2.ppc64le", "product_id": "krb5-libs-0:1.18.2-16.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-16.el8_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le", "product": { "name": "krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le", "product_id": "krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-16.el8_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-0:1.18.2-16.el8_6.2.ppc64le", "product": { "name": "krb5-server-0:1.18.2-16.el8_6.2.ppc64le", "product_id": "krb5-server-0:1.18.2-16.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.18.2-16.el8_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le", "product": { "name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le", "product_id": "krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-16.el8_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le", "product": { "name": "krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le", "product_id": "krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-16.el8_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "libkadm5-0:1.18.2-16.el8_6.2.ppc64le", "product": { "name": "libkadm5-0:1.18.2-16.el8_6.2.ppc64le", "product_id": "libkadm5-0:1.18.2-16.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.18.2-16.el8_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le", "product": { "name": "krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le", "product_id": "krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-16.el8_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "product": { "name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "product_id": "krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "product": { "name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "product_id": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "product": { "name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "product_id": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "product": { "name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "product_id": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "product": { "name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "product_id": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "product": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "product": { "name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "product_id": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "product": { "name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "product_id": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-16.el8_6.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.18.2-16.el8_6.2.s390x", "product": { "name": "krb5-devel-0:1.18.2-16.el8_6.2.s390x", "product_id": "krb5-devel-0:1.18.2-16.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-16.el8_6.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-libs-0:1.18.2-16.el8_6.2.s390x", "product": { "name": "krb5-libs-0:1.18.2-16.el8_6.2.s390x", "product_id": "krb5-libs-0:1.18.2-16.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-16.el8_6.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.18.2-16.el8_6.2.s390x", "product": { "name": "krb5-pkinit-0:1.18.2-16.el8_6.2.s390x", "product_id": "krb5-pkinit-0:1.18.2-16.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-16.el8_6.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-0:1.18.2-16.el8_6.2.s390x", "product": { "name": "krb5-server-0:1.18.2-16.el8_6.2.s390x", "product_id": "krb5-server-0:1.18.2-16.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.18.2-16.el8_6.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x", "product": { "name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x", "product_id": "krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-16.el8_6.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.18.2-16.el8_6.2.s390x", "product": { "name": "krb5-workstation-0:1.18.2-16.el8_6.2.s390x", "product_id": "krb5-workstation-0:1.18.2-16.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-16.el8_6.2?arch=s390x" } } }, { "category": "product_version", "name": "libkadm5-0:1.18.2-16.el8_6.2.s390x", "product": { "name": "libkadm5-0:1.18.2-16.el8_6.2.s390x", "product_id": "libkadm5-0:1.18.2-16.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.18.2-16.el8_6.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.18.2-16.el8_6.2.s390x", "product": { "name": "krb5-debugsource-0:1.18.2-16.el8_6.2.s390x", "product_id": "krb5-debugsource-0:1.18.2-16.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-16.el8_6.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x", "product": { "name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x", "product_id": "krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-16.el8_6.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x", "product": { "name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x", "product_id": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-16.el8_6.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x", "product": { "name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x", "product_id": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-16.el8_6.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x", "product": { "name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x", "product_id": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-16.el8_6.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x", "product": { "name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x", "product_id": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-16.el8_6.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x", "product": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x", "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-16.el8_6.2?arch=s390x" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x", "product": { "name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x", "product_id": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-16.el8_6.2?arch=s390x" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x", "product": { "name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x", "product_id": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-16.el8_6.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.18.2-16.el8_6.2.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.2.src" }, "product_reference": "krb5-0:1.18.2-16.el8_6.2.src", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-server-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-server-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "libkadm5-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "libkadm5-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.18.2-16.el8_6.2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.2.src" }, "product_reference": "krb5-0:1.18.2-16.el8_6.2.src", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64" }, "product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le" }, "product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x" }, "product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64" }, "product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le" }, "product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.s390x" }, "product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.aarch64" }, "product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.ppc64le" }, "product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.s390x" }, "product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.aarch64" }, "product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.ppc64le" }, "product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.s390x" }, "product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64" }, "product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le" }, "product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.s390x" }, "product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.aarch64" }, "product_reference": "krb5-server-0:1.18.2-16.el8_6.2.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-server-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.ppc64le" }, "product_reference": "krb5-server-0:1.18.2-16.el8_6.2.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.s390x" }, "product_reference": "krb5-server-0:1.18.2-16.el8_6.2.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-server-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64" }, "product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le" }, "product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x" }, "product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.aarch64" }, "product_reference": "krb5-workstation-0:1.18.2-16.el8_6.2.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le" }, "product_reference": "krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.s390x" }, "product_reference": "krb5-workstation-0:1.18.2-16.el8_6.2.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.aarch64" }, "product_reference": "libkadm5-0:1.18.2-16.el8_6.2.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "libkadm5-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.ppc64le" }, "product_reference": "libkadm5-0:1.18.2-16.el8_6.2.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.s390x" }, "product_reference": "libkadm5-0:1.18.2-16.el8_6.2.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "libkadm5-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)", "product_id": "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.18.2-16.el8_6.2.src as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.2.src" }, "product_reference": "krb5-0:1.18.2-16.el8_6.2.src", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-devel-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-libs-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-server-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-server-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-workstation-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "libkadm5-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "libkadm5-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)", "product_id": "BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "discovery_date": "2024-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2263240" } ], "notes": [ { "category": "description", "text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.", "title": "Vulnerability description" }, { "category": "summary", "text": "freeradius: forgery attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.2.src", "BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.2.src", "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.2.src", "BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-3596" }, { "category": "external", "summary": "RHBZ#2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/", "url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/html/rfc2865", "url": "https://datatracker.ietf.org/doc/html/rfc2865" }, { "category": "external", "summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf", "url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf" }, { "category": "external", "summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt", "url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt" }, { "category": "external", "summary": "https://www.blastradius.fail/", "url": "https://www.blastradius.fail/" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/456537", "url": "https://www.kb.cert.org/vuls/id/456537" } ], "release_date": "2024-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T01:44:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.2.src", "BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.2.src", "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.2.src", "BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8794" }, { "category": "workaround", "details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.", "product_ids": [ "BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.2.src", "BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.2.src", "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.2.src", "BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.Z.AUS:krb5-0:1.18.2-16.el8_6.2.src", "BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.AUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-0:1.18.2-16.el8_6.2.src", "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-devel-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-libs-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-server-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:libkadm5-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.aarch64", "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.ppc64le", "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.s390x", "BaseOS-8.6.0.Z.E4S:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-0:1.18.2-16.el8_6.2.src", "BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-debugsource-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-devel-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-devel-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-libs-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-libs-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-pkinit-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-pkinit-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-server-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-server-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-server-ldap-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-workstation-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:krb5-workstation-debuginfo-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:libkadm5-0:1.18.2-16.el8_6.2.x86_64", "BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.i686", "BaseOS-8.6.0.Z.TUS:libkadm5-debuginfo-0:1.18.2-16.el8_6.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freeradius: forgery attack" } ] }
rhsa-2024_4936
Vulnerability from csaf_redhat
Published
2024-07-31 10:30
Modified
2024-11-13 16:38
Summary
Red Hat Security Advisory: freeradius:3.0 security update
Notes
Topic
An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the freeradius:3.0 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "FreeRADIUS is a high-performance and highly configurable free Remote Authentication Dial In User Service (RADIUS) server, designed to allow centralized authentication and authorization for a network.\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:4936", "url": "https://access.redhat.com/errata/RHSA-2024:4936" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4936.json" } ], "title": "Red Hat Security Advisory: freeradius:3.0 security update", "tracking": { "current_release_date": "2024-11-13T16:38:45+00:00", "generator": { "date": "2024-11-13T16:38:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2024:4936", "initial_release_date": "2024-07-31T10:30:35+00:00", "revision_history": [ { "date": "2024-07-31T10:30:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-07-31T10:30:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T16:38:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "freeradius:3.0:8100020230904084920:69ef70f8", "product": { "name": "freeradius:3.0:8100020230904084920:69ef70f8", "product_id": "freeradius:3.0:8100020230904084920:69ef70f8", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/freeradius@3.0:8100020230904084920:69ef70f8" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src", "product": { "name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src", "product_id": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product": { "name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_id": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product": { "name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_id": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product": { "name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_id": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-debugsource@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-devel@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-doc@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-krb5-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-ldap-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-mysql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-perl-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-postgresql-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-rest-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-sqlite-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-unixODBC-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } }, { "category": "product_version", "name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/freeradius-utils-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } }, { "category": "product_version", "name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } }, { "category": "product_version", "name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product": { "name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_id": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-freeradius-debuginfo@3.0.20-15.module%2Bel8.10.0%2B22065%2Baa3d48ca?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, "product_reference": "freeradius:3.0:8100020230904084920:69ef70f8", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src" }, "product_reference": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" }, { "category": "default_component_of", "full_product_name": { "name": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64 as a component of freeradius:3.0:8100020230904084920:69ef70f8 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" }, "product_reference": "python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "discovery_date": "2024-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2263240" } ], "notes": [ { "category": "description", "text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.", "title": "Vulnerability description" }, { "category": "summary", "text": "freeradius: forgery attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-3596" }, { "category": "external", "summary": "RHBZ#2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/", "url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/html/rfc2865", "url": "https://datatracker.ietf.org/doc/html/rfc2865" }, { "category": "external", "summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf", "url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf" }, { "category": "external", "summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt", "url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt" }, { "category": "external", "summary": "https://www.blastradius.fail/", "url": "https://www.blastradius.fail/" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/456537", "url": "https://www.kb.cert.org/vuls/id/456537" } ], "release_date": "2024-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-07-31T10:30:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:4936" }, { "category": "workaround", "details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.src", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-debugsource-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-devel-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-doc-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-krb5-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-ldap-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-mysql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-perl-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-postgresql-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-rest-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-sqlite-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-unixODBC-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:freeradius-utils-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.s390x", "AppStream-8.10.0.Z.MAIN.EUS:freeradius:3.0:8100020230904084920:69ef70f8:python3-freeradius-debuginfo-0:3.0.20-15.module+el8.10.0+22065+aa3d48ca.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freeradius: forgery attack" } ] }
rhsa-2024_8792
Vulnerability from csaf_redhat
Published
2024-11-04 01:50
Modified
2024-11-13 16:38
Summary
Red Hat Security Advisory: krb5 security update
Notes
Topic
An update for krb5 is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* freeradius: forgery attack (CVE-2024-3596)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8792", "url": "https://access.redhat.com/errata/RHSA-2024:8792" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8792.json" } ], "title": "Red Hat Security Advisory: krb5 security update", "tracking": { "current_release_date": "2024-11-13T16:38:04+00:00", "generator": { "date": "2024-11-13T16:38:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2024:8792", "initial_release_date": "2024-11-04T01:50:17+00:00", "revision_history": [ { "date": "2024-11-04T01:50:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-04T01:50:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T16:38:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "krb5-0:1.18.2-26.el8_8.3.src", "product": { "name": "krb5-0:1.18.2-26.el8_8.3.src", "product_id": "krb5-0:1.18.2-26.el8_8.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5@1.18.2-26.el8_8.3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.18.2-26.el8_8.3.aarch64", "product": { "name": "krb5-devel-0:1.18.2-26.el8_8.3.aarch64", "product_id": "krb5-devel-0:1.18.2-26.el8_8.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.3?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.18.2-26.el8_8.3.aarch64", "product": { "name": "krb5-libs-0:1.18.2-26.el8_8.3.aarch64", "product_id": "krb5-libs-0:1.18.2-26.el8_8.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.3?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64", "product": { "name": "krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64", "product_id": "krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.3?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-0:1.18.2-26.el8_8.3.aarch64", "product": { "name": "krb5-server-0:1.18.2-26.el8_8.3.aarch64", "product_id": "krb5-server-0:1.18.2-26.el8_8.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.3?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64", "product": { "name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64", "product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.3?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.18.2-26.el8_8.3.aarch64", "product": { "name": "krb5-workstation-0:1.18.2-26.el8_8.3.aarch64", "product_id": "krb5-workstation-0:1.18.2-26.el8_8.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-26.el8_8.3?arch=aarch64" } } }, { "category": "product_version", "name": "libkadm5-0:1.18.2-26.el8_8.3.aarch64", "product": { "name": "libkadm5-0:1.18.2-26.el8_8.3.aarch64", "product_id": "libkadm5-0:1.18.2-26.el8_8.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.3?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64", "product": { "name": "krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64", "product_id": "krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.3?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "product": { "name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.3?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "product": { "name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.3?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "product": { "name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.3?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "product": { "name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.3?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "product": { "name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.3?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "product": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.3?arch=aarch64" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "product": { "name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.3?arch=aarch64" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "product": { "name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.3?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.18.2-26.el8_8.3.ppc64le", "product": { "name": "krb5-devel-0:1.18.2-26.el8_8.3.ppc64le", "product_id": "krb5-devel-0:1.18.2-26.el8_8.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.3?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-libs-0:1.18.2-26.el8_8.3.ppc64le", "product": { "name": "krb5-libs-0:1.18.2-26.el8_8.3.ppc64le", "product_id": "krb5-libs-0:1.18.2-26.el8_8.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.3?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le", "product": { "name": "krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le", "product_id": "krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.3?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-0:1.18.2-26.el8_8.3.ppc64le", "product": { "name": "krb5-server-0:1.18.2-26.el8_8.3.ppc64le", "product_id": "krb5-server-0:1.18.2-26.el8_8.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.3?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le", "product": { "name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le", "product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.3?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le", "product": { "name": "krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le", "product_id": "krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-26.el8_8.3?arch=ppc64le" } } }, { "category": "product_version", "name": "libkadm5-0:1.18.2-26.el8_8.3.ppc64le", "product": { "name": "libkadm5-0:1.18.2-26.el8_8.3.ppc64le", "product_id": "libkadm5-0:1.18.2-26.el8_8.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.3?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le", "product": { "name": "krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le", "product_id": "krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.3?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "product": { "name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "product": { "name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "product": { "name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "product": { "name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "product": { "name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "product": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "product": { "name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "product": { "name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.3?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.18.2-26.el8_8.3.i686", "product": { "name": "krb5-devel-0:1.18.2-26.el8_8.3.i686", "product_id": "krb5-devel-0:1.18.2-26.el8_8.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.3?arch=i686" } } }, { "category": "product_version", "name": "krb5-libs-0:1.18.2-26.el8_8.3.i686", "product": { "name": "krb5-libs-0:1.18.2-26.el8_8.3.i686", "product_id": "krb5-libs-0:1.18.2-26.el8_8.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.3?arch=i686" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.18.2-26.el8_8.3.i686", "product": { "name": "krb5-pkinit-0:1.18.2-26.el8_8.3.i686", "product_id": "krb5-pkinit-0:1.18.2-26.el8_8.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.3?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-0:1.18.2-26.el8_8.3.i686", "product": { "name": "krb5-server-0:1.18.2-26.el8_8.3.i686", "product_id": "krb5-server-0:1.18.2-26.el8_8.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.3?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.i686", "product": { "name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.i686", "product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.3?arch=i686" } } }, { "category": "product_version", "name": "libkadm5-0:1.18.2-26.el8_8.3.i686", "product": { "name": "libkadm5-0:1.18.2-26.el8_8.3.i686", "product_id": "libkadm5-0:1.18.2-26.el8_8.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.3?arch=i686" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.18.2-26.el8_8.3.i686", "product": { "name": "krb5-debugsource-0:1.18.2-26.el8_8.3.i686", "product_id": "krb5-debugsource-0:1.18.2-26.el8_8.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.3?arch=i686" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.i686", "product": { "name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.i686", "product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.3?arch=i686" } } }, { "category": "product_version", "name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686", "product": { "name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686", "product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.3?arch=i686" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686", "product": { "name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686", "product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.3?arch=i686" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686", "product": { "name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686", "product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.3?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686", "product": { "name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686", "product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.3?arch=i686" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686", "product": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686", "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.3?arch=i686" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686", "product": { "name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686", "product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.3?arch=i686" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686", "product": { "name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686", "product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.3?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.18.2-26.el8_8.3.x86_64", "product": { "name": "krb5-devel-0:1.18.2-26.el8_8.3.x86_64", "product_id": "krb5-devel-0:1.18.2-26.el8_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.18.2-26.el8_8.3.x86_64", "product": { "name": "krb5-libs-0:1.18.2-26.el8_8.3.x86_64", "product_id": "krb5-libs-0:1.18.2-26.el8_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64", "product": { "name": "krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64", "product_id": "krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-0:1.18.2-26.el8_8.3.x86_64", "product": { "name": "krb5-server-0:1.18.2-26.el8_8.3.x86_64", "product_id": "krb5-server-0:1.18.2-26.el8_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64", "product": { "name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64", "product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.18.2-26.el8_8.3.x86_64", "product": { "name": "krb5-workstation-0:1.18.2-26.el8_8.3.x86_64", "product_id": "krb5-workstation-0:1.18.2-26.el8_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-26.el8_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "libkadm5-0:1.18.2-26.el8_8.3.x86_64", "product": { "name": "libkadm5-0:1.18.2-26.el8_8.3.x86_64", "product_id": "libkadm5-0:1.18.2-26.el8_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64", "product": { "name": "krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64", "product_id": "krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "product": { "name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "product": { "name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "product": { "name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "product": { "name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "product": { "name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "product": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "product": { "name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.3?arch=x86_64" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "product": { "name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "krb5-devel-0:1.18.2-26.el8_8.3.s390x", "product": { "name": "krb5-devel-0:1.18.2-26.el8_8.3.s390x", "product_id": "krb5-devel-0:1.18.2-26.el8_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-26.el8_8.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-libs-0:1.18.2-26.el8_8.3.s390x", "product": { "name": "krb5-libs-0:1.18.2-26.el8_8.3.s390x", "product_id": "krb5-libs-0:1.18.2-26.el8_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-26.el8_8.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-pkinit-0:1.18.2-26.el8_8.3.s390x", "product": { "name": "krb5-pkinit-0:1.18.2-26.el8_8.3.s390x", "product_id": "krb5-pkinit-0:1.18.2-26.el8_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-26.el8_8.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-0:1.18.2-26.el8_8.3.s390x", "product": { "name": "krb5-server-0:1.18.2-26.el8_8.3.s390x", "product_id": "krb5-server-0:1.18.2-26.el8_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.18.2-26.el8_8.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x", "product": { "name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x", "product_id": "krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-26.el8_8.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.18.2-26.el8_8.3.s390x", "product": { "name": "krb5-workstation-0:1.18.2-26.el8_8.3.s390x", "product_id": "krb5-workstation-0:1.18.2-26.el8_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-26.el8_8.3?arch=s390x" } } }, { "category": "product_version", "name": "libkadm5-0:1.18.2-26.el8_8.3.s390x", "product": { "name": "libkadm5-0:1.18.2-26.el8_8.3.s390x", "product_id": "libkadm5-0:1.18.2-26.el8_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5@1.18.2-26.el8_8.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-debugsource-0:1.18.2-26.el8_8.3.s390x", "product": { "name": "krb5-debugsource-0:1.18.2-26.el8_8.3.s390x", "product_id": "krb5-debugsource-0:1.18.2-26.el8_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-26.el8_8.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x", "product": { "name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x", "product_id": "krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-26.el8_8.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x", "product": { "name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x", "product_id": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-26.el8_8.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x", "product": { "name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x", "product_id": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-26.el8_8.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x", "product": { "name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x", "product_id": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-26.el8_8.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x", "product": { "name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x", "product_id": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-26.el8_8.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x", "product": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x", "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-26.el8_8.3?arch=s390x" } } }, { "category": "product_version", "name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x", "product": { "name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x", "product_id": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-26.el8_8.3?arch=s390x" } } }, { "category": "product_version", "name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x", "product": { "name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x", "product_id": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-26.el8_8.3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.18.2-26.el8_8.3.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.3.src" }, "product_reference": "krb5-0:1.18.2-26.el8_8.3.src", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64" }, "product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.i686" }, "product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.3.i686", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le" }, "product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x" }, "product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64" }, "product_reference": "krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64" }, "product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.i686" }, "product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.3.i686", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le" }, "product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.s390x" }, "product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.3.s390x", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64" }, "product_reference": "krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.aarch64" }, "product_reference": "krb5-devel-0:1.18.2-26.el8_8.3.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.i686" }, "product_reference": "krb5-devel-0:1.18.2-26.el8_8.3.i686", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.ppc64le" }, "product_reference": "krb5-devel-0:1.18.2-26.el8_8.3.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.s390x" }, "product_reference": "krb5-devel-0:1.18.2-26.el8_8.3.s390x", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.x86_64" }, "product_reference": "krb5-devel-0:1.18.2-26.el8_8.3.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64" }, "product_reference": "krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.aarch64" }, "product_reference": "krb5-libs-0:1.18.2-26.el8_8.3.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.i686" }, "product_reference": "krb5-libs-0:1.18.2-26.el8_8.3.i686", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.ppc64le" }, "product_reference": "krb5-libs-0:1.18.2-26.el8_8.3.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.s390x" }, "product_reference": "krb5-libs-0:1.18.2-26.el8_8.3.s390x", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.x86_64" }, "product_reference": "krb5-libs-0:1.18.2-26.el8_8.3.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64" }, "product_reference": "krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64" }, "product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.i686" }, "product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.3.i686", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le" }, "product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.s390x" }, "product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.3.s390x", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64" }, "product_reference": "krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64" }, "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.aarch64" }, "product_reference": "krb5-server-0:1.18.2-26.el8_8.3.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.i686" }, "product_reference": "krb5-server-0:1.18.2-26.el8_8.3.i686", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.ppc64le" }, "product_reference": "krb5-server-0:1.18.2-26.el8_8.3.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.s390x" }, "product_reference": "krb5-server-0:1.18.2-26.el8_8.3.s390x", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.x86_64" }, "product_reference": "krb5-server-0:1.18.2-26.el8_8.3.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64" }, "product_reference": "krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64" }, "product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.i686" }, "product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.3.i686", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le" }, "product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x" }, "product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64" }, "product_reference": "krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64" }, "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.aarch64" }, "product_reference": "krb5-workstation-0:1.18.2-26.el8_8.3.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le" }, "product_reference": "krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.s390x" }, "product_reference": "krb5-workstation-0:1.18.2-26.el8_8.3.s390x", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.x86_64" }, "product_reference": "krb5-workstation-0:1.18.2-26.el8_8.3.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64" }, "product_reference": "krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.aarch64" }, "product_reference": "libkadm5-0:1.18.2-26.el8_8.3.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.i686" }, "product_reference": "libkadm5-0:1.18.2-26.el8_8.3.i686", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.ppc64le" }, "product_reference": "libkadm5-0:1.18.2-26.el8_8.3.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.s390x" }, "product_reference": "libkadm5-0:1.18.2-26.el8_8.3.s390x", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.x86_64" }, "product_reference": "libkadm5-0:1.18.2-26.el8_8.3.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)", "product_id": "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64" }, "product_reference": "libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "relates_to_product_reference": "BaseOS-8.8.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "discovery_date": "2024-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2263240" } ], "notes": [ { "category": "description", "text": "A vulnerability in the RADIUS (Remote Authentication Dial-In User Service) protocol allows attackers to forge authentication responses when the Message-Authenticator attribute is not enforced. This issue arises from a cryptographically insecure integrity check using MD5, enabling attackers to spoof UDP-based RADIUS response packets. This can result in unauthorized access by modifying an Access-Reject response to an Access-Accept response, thereby compromising the authentication process.", "title": "Vulnerability description" }, { "category": "summary", "text": "freeradius: forgery attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of Important severity due to its ability to undermine the fundamental security mechanisms of RADIUS-based authentication systems. By exploiting the weak MD5 integrity check, an attacker can forge RADIUS responses, effectively bypassing authentication controls and gaining unauthorized access to network resources. This poses a significant threat to environments relying on RADIUS for user and device authentication, particularly those lacking enforced Message-Authenticator attributes or TLS/DTLS encryption.\n\nThere are several preconditions for this attack to be possible:\n* An attacker needs man-in-the-middle network access between the RADIUS client and server\n* The client and server must be using RADIUS/UDP to communicate\n* The attacker needs to be able to trigger a RADIUS client Access-Request ( for example the client is using PAP authentication)\n\nDue to these attack surface limitations, the impact is rated Important.\nWithin Red Hat offerings, this impacts the FreeRADIUS package. This flaw allows a local, unauthenticated attacker to conduct a man-in-the-middle attack to log in as a third party without knowing their credentials. Servers using Extensible Authentication Protocol (EAP) with required Message-Authenticator attributes or those employing TLS/DTLS encryption are not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.3.src", "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-3596" }, { "category": "external", "summary": "RHBZ#2263240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/", "url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/" }, { "category": "external", "summary": "https://datatracker.ietf.org/doc/html/rfc2865", "url": "https://datatracker.ietf.org/doc/html/rfc2865" }, { "category": "external", "summary": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf", "url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf" }, { "category": "external", "summary": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt", "url": "https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt" }, { "category": "external", "summary": "https://www.blastradius.fail/", "url": "https://www.blastradius.fail/" }, { "category": "external", "summary": "https://www.kb.cert.org/vuls/id/456537", "url": "https://www.kb.cert.org/vuls/id/456537" } ], "release_date": "2024-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T01:50:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.3.src", "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8792" }, { "category": "workaround", "details": "Disable the use of RADIUS/UDP and RADIUS/TCP.\nRADIUS/TLS or RADIUS/DTLS should be used.", "product_ids": [ "BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.3.src", "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.8.0.Z.EUS:krb5-0:1.18.2-26.el8_8.3.src", "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-debugsource-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-devel-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-devel-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-libs-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-libs-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-pkinit-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-server-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-server-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-server-ldap-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-workstation-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:krb5-workstation-debuginfo-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:libkadm5-0:1.18.2-26.el8_8.3.x86_64", "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.aarch64", "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.i686", "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.ppc64le", "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.s390x", "BaseOS-8.8.0.Z.EUS:libkadm5-debuginfo-0:1.18.2-26.el8_8.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "freeradius: forgery attack" } ] }
ghsa-3g8x-wqfp-q876
Vulnerability from github
Published
2024-07-09 12:30
Modified
2024-07-23 09:30
Details
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
{ "affected": [], "aliases": [ "CVE-2024-3596" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-07-09T12:15:20Z", "severity": null }, "details": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.", "id": "GHSA-3g8x-wqfp-q876", "modified": "2024-07-23T09:30:39Z", "published": "2024-07-09T12:30:58Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3596" }, { "type": "WEB", "url": "https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius" }, { "type": "WEB", "url": "https://datatracker.ietf.org/doc/html/rfc2865" }, { "type": "WEB", "url": "https://networkradius.com/assets/pdf/radius_and_md5_collisions.pdf" }, { "type": "WEB", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014" }, { "type": "WEB", "url": "https://www.blastradius.fail" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2024/07/09/4" } ], "schema_version": "1.4.0", "severity": [] }
ncsc-2024-0279
Vulnerability from csaf_ncscnl
Published
2024-07-09 18:40
Modified
2024-07-09 18:40
Summary
Kwetsbaarheden verholpen in Microsoft Windows
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Microsoft heeft kwetsbaarheden verholpen in Windows.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Omzeilen van beveiligingsmaatregel
- (Remote) code execution (Administrator/Root rechten)
- (Remote) code execution (Gebruikersrechten)
- SQL Injection
- Toegang tot systeemgegevens
- Verhoogde gebruikersrechten
De ernstigste kwetsbaarheden hebben kenmerk CVE-2024-38076, CVE-2024-38074 en CVE-2024-38076 toegewezen gekregen en bevindt zich in Windows Remote Desktop Licensing Service. Een ongeauthenticeerde kwaadwillende kan de kwetsbaarheid misbruiken om willekeurige code uit te voeren met verhoogde rechten.
```
---
Windows Server Backup:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38013 | 6.70 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows PowerShell:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38043 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-38033 | 7.30 | Verkrijgen van verhoogde rechten |
| CVE-2024-38047 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Remote Desktop:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38015 | 7.50 | Denial-of-Service |
| CVE-2024-38076 | 9.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Image Acquisition:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38022 | 7.00 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Internet Connection Sharing (ICS):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38102 | 6.50 | Denial-of-Service |
| CVE-2024-38053 | 8.80 | Uitvoeren van willekeurige code |
| CVE-2024-38101 | 6.50 | Denial-of-Service |
| CVE-2024-38105 | 6.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Intel:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-37985 | 5.90 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows Online Certificate Status Protocol (OCSP):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38031 | 7.50 | Denial-of-Service |
| CVE-2024-38067 | 7.50 | Denial-of-Service |
| CVE-2024-38068 | 7.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows COM Session:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38100 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Kernel:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38041 | 5.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows Secure Boot:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-28899 | 8.80 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37969 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37970 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37974 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37981 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37986 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37987 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-26184 | 6.80 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37971 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37972 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37973 | 7.80 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37975 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37977 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37978 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37984 | 8.40 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37988 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37989 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-38010 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-38011 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-38065 | 6.80 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Windows Kernel-Mode Drivers:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38062 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Win32 Kernel Subsystem:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38085 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Microsoft Windows Codecs Library:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38055 | 5.50 | Toegang tot gevoelige gegevens |
| CVE-2024-38056 | 5.50 | Toegang tot gevoelige gegevens |
| CVE-2024-38060 | 8.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Workstation Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38050 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows LockDown Policy (WLDP):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38070 | 7.80 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Microsoft Graphics Component:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38051 | 7.80 | Uitvoeren van willekeurige code |
| CVE-2024-38079 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows MultiPoint Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-30013 | 8.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Line Printer Daemon Service (LPD):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38027 | 6.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
NDIS:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38048 | 6.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows CoreMessaging:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-21417 | 8.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Remote Access Connection Manager:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-30071 | 4.70 | Toegang tot gevoelige gegevens |
| CVE-2024-30079 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Cryptographic Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-30098 | 7.50 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Windows Win32K - GRFX:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38066 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Role: Windows Hyper-V:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38080 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
NPS RADIUS Server:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-3596 | 7.50 | Voordoen als andere gebruiker |
|----------------|------|-------------------------------------|
Microsoft Streaming Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38054 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-38052 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-38057 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Remote Desktop Licensing Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38071 | 7.50 | Denial-of-Service |
| CVE-2024-38072 | 7.50 | Denial-of-Service |
| CVE-2024-38077 | 9.80 | Uitvoeren van willekeurige code |
| CVE-2024-38073 | 7.50 | Denial-of-Service |
| CVE-2024-38074 | 9.80 | Uitvoeren van willekeurige code |
| CVE-2024-38099 | 5.90 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows NTLM:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-30081 | 7.10 | Voordoen als andere gebruiker |
|----------------|------|-------------------------------------|
Microsoft WS-Discovery:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38091 | 7.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows Distributed Transaction Coordinator:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38049 | 6.60 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Performance Monitor:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38025 | 7.20 | Uitvoeren van willekeurige code |
| CVE-2024-38019 | 7.20 | Uitvoeren van willekeurige code |
| CVE-2024-38028 | 7.20 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
XBox Crypto Graphic Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38032 | 7.10 | Uitvoeren van willekeurige code |
| CVE-2024-38078 | 7.50 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows iSCSI:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-35270 | 5.30 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows Enroll Engine:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38069 | 7.00 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Windows Fax and Scan Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38104 | 8.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows TCP/IP:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38064 | 7.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows DHCP Server:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38044 | 7.20 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Themes:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38030 | 6.50 | Voordoen als andere gebruiker |
|----------------|------|-------------------------------------|
Windows Message Queuing:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38017 | 5.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows Win32K - ICOMP:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38059 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Active Directory Rights Management Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38517 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-39684 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows BitLocker:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38058 | 6.80 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Role: Active Directory Certificate Services; Active Directory Domain Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38061 | 7.50 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Filtering:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38034 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows MSHTML Platform:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38112 | 7.50 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
---
```
Oplossingen
Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:
https://portal.msrc.microsoft.com/en-us/security-guidance
Dreigingsinformatie
Kans
medium
Schade
high
CWE-121
Stack-based Buffer Overflow
CWE-122
Heap-based Buffer Overflow
CWE-125
Out-of-bounds Read
CWE-126
Buffer Over-read
CWE-130
Improper Handling of Length Parameter Inconsistency
CWE-166
Improper Handling of Missing Special Element
CWE-190
Integer Overflow or Wraparound
CWE-191
Integer Underflow (Wrap or Wraparound)
CWE-197
Numeric Truncation Error
CWE-20
Improper Input Validation
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-284
Improper Access Control
CWE-287
Improper Authentication
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE-328
Use of Weak Hash
CWE-347
Improper Verification of Cryptographic Signature
CWE-400
Uncontrolled Resource Consumption
CWE-415
Double Free
CWE-416
Use After Free
CWE-476
NULL Pointer Dereference
CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE-668
Exposure of Resource to Wrong Sphere
CWE-674
Uncontrolled Recursion
CWE-693
Protection Mechanism Failure
CWE-73
External Control of File Name or Path
CWE-822
Untrusted Pointer Dereference
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CWE-908
Use of Uninitialized Resource
CWE-924
Improper Enforcement of Message Integrity During Transmission in a Communication Channel
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Microsoft heeft kwetsbaarheden verholpen in Windows.\n\n", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Omzeilen van beveiligingsmaatregel\n- (Remote) code execution (Administrator/Root rechten)\n- (Remote) code execution (Gebruikersrechten)\n- SQL Injection\n- Toegang tot systeemgegevens\n- Verhoogde gebruikersrechten\n\n\nDe ernstigste kwetsbaarheden hebben kenmerk CVE-2024-38076, CVE-2024-38074 en CVE-2024-38076 toegewezen gekregen en bevindt zich in Windows Remote Desktop Licensing Service. Een ongeauthenticeerde kwaadwillende kan de kwetsbaarheid misbruiken om willekeurige code uit te voeren met verhoogde rechten. \n\n```\n\n---\nWindows Server Backup: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38013 | 6.70 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows PowerShell: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38043 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38033 | 7.30 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38047 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38015 | 7.50 | Denial-of-Service | \n| CVE-2024-38076 | 9.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Image Acquisition: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38022 | 7.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Internet Connection Sharing (ICS): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38102 | 6.50 | Denial-of-Service | \n| CVE-2024-38053 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38101 | 6.50 | Denial-of-Service | \n| CVE-2024-38105 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nIntel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-37985 | 5.90 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Online Certificate Status Protocol (OCSP): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38031 | 7.50 | Denial-of-Service | \n| CVE-2024-38067 | 7.50 | Denial-of-Service | \n| CVE-2024-38068 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows COM Session: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38100 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Kernel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38041 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Secure Boot: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-28899 | 8.80 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37969 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37970 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37974 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37981 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37986 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37987 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-26184 | 6.80 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37971 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37972 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37973 | 7.80 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37975 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37977 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37978 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37984 | 8.40 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37988 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37989 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-38010 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-38011 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-38065 | 6.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Kernel-Mode Drivers: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38062 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Win32 Kernel Subsystem: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38085 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Windows Codecs Library: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38055 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2024-38056 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2024-38060 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Workstation Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38050 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows LockDown Policy (WLDP): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38070 | 7.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nMicrosoft Graphics Component: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38051 | 7.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38079 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows MultiPoint Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30013 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nLine Printer Daemon Service (LPD): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38027 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nNDIS: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38048 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows CoreMessaging: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-21417 | 8.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Remote Access Connection Manager: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30071 | 4.70 | Toegang tot gevoelige gegevens | \n| CVE-2024-30079 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Cryptographic Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30098 | 7.50 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - GRFX: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38066 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nRole: Windows Hyper-V: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38080 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nNPS RADIUS Server: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-3596 | 7.50 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nMicrosoft Streaming Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38054 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38052 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38057 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop Licensing Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38071 | 7.50 | Denial-of-Service | \n| CVE-2024-38072 | 7.50 | Denial-of-Service | \n| CVE-2024-38077 | 9.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38073 | 7.50 | Denial-of-Service | \n| CVE-2024-38074 | 9.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38099 | 5.90 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows NTLM: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30081 | 7.10 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nMicrosoft WS-Discovery: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38091 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Distributed Transaction Coordinator: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38049 | 6.60 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Performance Monitor: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38025 | 7.20 | Uitvoeren van willekeurige code | \n| CVE-2024-38019 | 7.20 | Uitvoeren van willekeurige code | \n| CVE-2024-38028 | 7.20 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nXBox Crypto Graphic Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38032 | 7.10 | Uitvoeren van willekeurige code | \n| CVE-2024-38078 | 7.50 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows iSCSI: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-35270 | 5.30 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Enroll Engine: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38069 | 7.00 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Fax and Scan Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38104 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows TCP/IP: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38064 | 7.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows DHCP Server: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38044 | 7.20 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Themes: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38030 | 6.50 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nWindows Message Queuing: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38017 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - ICOMP: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38059 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nActive Directory Rights Management Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38517 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-39684 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\n\nWindows BitLocker: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38058 | 6.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nRole: Active Directory Certificate Services; Active Directory Domain Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38061 | 7.50 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Filtering: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38034 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows MSHTML Platform: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38112 | 7.50 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\n\n---\n\n```", "title": "Interpretaties" }, { "category": "description", "text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance", "title": "Oplossingen" }, { "category": "description", "text": " ", "title": "Dreigingsinformatie" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Buffer Over-read", "title": "CWE-126" }, { "category": "general", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" }, { "category": "general", "text": "Improper Handling of Missing Special Element", "title": "CWE-166" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" }, { "category": "general", "text": "Numeric Truncation Error", "title": "CWE-197" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Authentication", "title": "CWE-287" }, { "category": "general", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" }, { "category": "general", "text": "Use of Weak Hash", "title": "CWE-328" }, { "category": "general", "text": "Improper Verification of Cryptographic Signature", "title": "CWE-347" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Double Free", "title": "CWE-415" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" }, { "category": "general", "text": "Exposure of Resource to Wrong Sphere", "title": "CWE-668" }, { "category": "general", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "Protection Mechanism Failure", "title": "CWE-693" }, { "category": "general", "text": "External Control of File Name or Path", "title": "CWE-73" }, { "category": "general", "text": "Untrusted Pointer Dereference", "title": "CWE-822" }, { "category": "general", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" }, { "category": "general", "text": "Use of Uninitialized Resource", "title": "CWE-908" }, { "category": "general", "text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel", "title": "CWE-924" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "title": "Kwetsbaarheden verholpen in Microsoft Windows", "tracking": { "current_release_date": "2024-07-09T18:40:21.043319Z", "id": "NCSC-2024-0279", "initial_release_date": "2024-07-09T18:40:21.043319Z", "revision_history": [ { "date": "2024-07-09T18:40:21.043319Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "rfc", "product": { "name": "rfc", "product_id": "CSAFPID-1497114", "product_identification_helper": { "cpe": "cpe:2.3:a:ietf:rfc:2865:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "ietf" }, { "branches": [ { "category": "product_name", "name": "windows_10_version_1507", "product": { "name": "windows_10_version_1507", "product_id": "CSAFPID-1453769", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_10_version_1507:10.0.0:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "microsoft" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-21417", "references": [ { "category": "self", "summary": "CVE-2024-21417", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21417.json" } ], "title": "CVE-2024-21417" }, { "cve": "CVE-2024-28899", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28899", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28899.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-28899" }, { "cve": "CVE-2024-30081", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-30081", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30081.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-30081" }, { "cve": "CVE-2024-30098", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "other", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-30098", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30098.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-30098" }, { "cve": "CVE-2024-35270", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-35270", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35270.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-35270" }, { "cve": "CVE-2024-37969", "cwe": { "id": "CWE-822", "name": "Untrusted Pointer Dereference" }, "notes": [ { "category": "other", "text": "Untrusted Pointer Dereference", "title": "CWE-822" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37969", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37969.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37969" }, { "cve": "CVE-2024-37970", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37970", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37970.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37970" }, { "cve": "CVE-2024-37974", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37974", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37974.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37974" }, { "cve": "CVE-2024-37981", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "references": [ { "category": "self", "summary": "CVE-2024-37981", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37981.json" } ], "title": "CVE-2024-37981" }, { "cve": "CVE-2024-37986", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37986", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37986.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37986" }, { "cve": "CVE-2024-37987", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37987", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37987.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37987" }, { "cve": "CVE-2024-38013", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "other", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38013", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38013.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38013" }, { "cve": "CVE-2024-38022", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "other", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38022", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38022.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38022" }, { "cve": "CVE-2024-38025", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38025", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38025.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38025" }, { "cve": "CVE-2024-38034", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38034", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38034.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38034" }, { "cve": "CVE-2024-38041", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "references": [ { "category": "self", "summary": "CVE-2024-38041", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38041.json" } ], "title": "CVE-2024-38041" }, { "cve": "CVE-2024-38043", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2024-38043", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38043.json" } ], "title": "CVE-2024-38043" }, { "cve": "CVE-2024-38517", "references": [ { "category": "self", "summary": "CVE-2024-38517", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38517.json" } ], "title": "CVE-2024-38517" }, { "cve": "CVE-2024-38051", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38051", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38051.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38051" }, { "cve": "CVE-2024-38054", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38054", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38054.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38054" }, { "cve": "CVE-2024-38055", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38055", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38055.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38055" }, { "cve": "CVE-2024-38056", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38056", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38056.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38056" }, { "cve": "CVE-2024-38060", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38060", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38060.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38060" }, { "cve": "CVE-2024-38061", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38061", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38061.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38061" }, { "cve": "CVE-2024-38062", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2024-38062", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38062.json" } ], "title": "CVE-2024-38062" }, { "cve": "CVE-2024-38064", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "other", "text": "Use of Uninitialized Resource", "title": "CWE-908" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38064", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38064.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38064" }, { "cve": "CVE-2024-38085", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38085", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38085.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38085" }, { "cve": "CVE-2024-38091", "cwe": { "id": "CWE-166", "name": "Improper Handling of Missing Special Element" }, "notes": [ { "category": "other", "text": "Improper Handling of Missing Special Element", "title": "CWE-166" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38091", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38091.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38091" }, { "cve": "CVE-2024-38102", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38102", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38102.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38102" }, { "cve": "CVE-2024-38104", "cwe": { "id": "CWE-822", "name": "Untrusted Pointer Dereference" }, "notes": [ { "category": "other", "text": "Untrusted Pointer Dereference", "title": "CWE-822" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38104", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38104.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38104" }, { "cve": "CVE-2024-30013", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "other", "text": "Double Free", "title": "CWE-415" } ], "references": [ { "category": "self", "summary": "CVE-2024-30013", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30013.json" } ], "title": "CVE-2024-30013" }, { "cve": "CVE-2024-30071", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-30071", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30071.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-30071" }, { "cve": "CVE-2024-30079", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-30079", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30079.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-30079" }, { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "notes": [ { "category": "other", "text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel", "title": "CWE-924" }, { "category": "other", "text": "Use of Weak Hash", "title": "CWE-328" } ], "product_status": { "known_affected": [ "CSAFPID-1497114" ] }, "references": [ { "category": "self", "summary": "CVE-2024-3596", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-3596.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1497114" ] } ], "title": "CVE-2024-3596" }, { "cve": "CVE-2024-37971", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37971", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37971.json" } ], "title": "CVE-2024-37971" }, { "cve": "CVE-2024-37972", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37972", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37972.json" } ], "title": "CVE-2024-37972" }, { "cve": "CVE-2024-37973", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "other", "text": "Uncontrolled Recursion", "title": "CWE-674" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37973", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37973.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37973" }, { "cve": "CVE-2024-37975", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37975", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37975.json" } ], "title": "CVE-2024-37975" }, { "cve": "CVE-2024-37984", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37984", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37984.json" } ], "title": "CVE-2024-37984" }, { "cve": "CVE-2024-37988", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37988", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37988.json" } ], "title": "CVE-2024-37988" }, { "cve": "CVE-2024-37989", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37989", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37989.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37989" }, { "cve": "CVE-2024-38010", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38010", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38010.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38010" }, { "cve": "CVE-2024-38011", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38011", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38011.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38011" }, { "cve": "CVE-2024-38017", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38017", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38017.json" } ], "title": "CVE-2024-38017" }, { "cve": "CVE-2024-38019", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38019", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38019.json" } ], "title": "CVE-2024-38019" }, { "cve": "CVE-2024-38027", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38027", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38027.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38027" }, { "cve": "CVE-2024-38028", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38028", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38028.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38028" }, { "cve": "CVE-2024-38030", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38030", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38030.json" } ], "title": "CVE-2024-38030" }, { "cve": "CVE-2024-38033", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38033", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38033.json" } ], "title": "CVE-2024-38033" }, { "cve": "CVE-2024-38047", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2024-38047", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38047.json" } ], "title": "CVE-2024-38047" }, { "cve": "CVE-2024-38048", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38048", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38048.json" } ], "title": "CVE-2024-38048" }, { "cve": "CVE-2024-38049", "cwe": { "id": "CWE-73", "name": "External Control of File Name or Path" }, "notes": [ { "category": "other", "text": "External Control of File Name or Path", "title": "CWE-73" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38049", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38049.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38049" }, { "cve": "CVE-2024-38050", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38050", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38050.json" } ], "title": "CVE-2024-38050" }, { "cve": "CVE-2024-38052", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38052", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38052.json" } ], "title": "CVE-2024-38052" }, { "cve": "CVE-2024-38053", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38053", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38053.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38053" }, { "cve": "CVE-2024-38057", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38057", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38057.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38057" }, { "cve": "CVE-2024-38058", "cwe": { "id": "CWE-693", "name": "Protection Mechanism Failure" }, "notes": [ { "category": "other", "text": "Protection Mechanism Failure", "title": "CWE-693" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38058", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38058.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38058" }, { "cve": "CVE-2024-38065", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38065", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38065.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38065" }, { "cve": "CVE-2024-38066", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38066", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38066.json" } ], "title": "CVE-2024-38066" }, { "cve": "CVE-2024-38068", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38068", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38068.json" } ], "title": "CVE-2024-38068" }, { "cve": "CVE-2024-38069", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "notes": [ { "category": "other", "text": "Improper Verification of Cryptographic Signature", "title": "CWE-347" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38069", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38069.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38069" }, { "cve": "CVE-2024-38070", "cwe": { "id": "CWE-693", "name": "Protection Mechanism Failure" }, "notes": [ { "category": "other", "text": "Protection Mechanism Failure", "title": "CWE-693" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38070", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38070.json" } ], "title": "CVE-2024-38070" }, { "cve": "CVE-2024-38079", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38079", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38079.json" } ], "title": "CVE-2024-38079" }, { "cve": "CVE-2024-38101", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38101", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38101.json" } ], "title": "CVE-2024-38101" }, { "cve": "CVE-2024-38105", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38105", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38105.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38105" }, { "cve": "CVE-2024-39684", "references": [ { "category": "self", "summary": "CVE-2024-39684", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39684.json" } ], "title": "CVE-2024-39684" }, { "cve": "CVE-2024-38015", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2024-38015", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38015.json" } ], "title": "CVE-2024-38015" }, { "cve": "CVE-2024-38071", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" } ], "references": [ { "category": "self", "summary": "CVE-2024-38071", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38071.json" } ], "title": "CVE-2024-38071" }, { "cve": "CVE-2024-38072", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2024-38072", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38072.json" } ], "title": "CVE-2024-38072" }, { "cve": "CVE-2024-38077", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "references": [ { "category": "self", "summary": "CVE-2024-38077", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38077.json" } ], "title": "CVE-2024-38077" }, { "cve": "CVE-2024-38100", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "references": [ { "category": "self", "summary": "CVE-2024-38100", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38100.json" } ], "title": "CVE-2024-38100" }, { "cve": "CVE-2024-38031", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2024-38031", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38031.json" } ], "title": "CVE-2024-38031" }, { "cve": "CVE-2024-38044", "cwe": { "id": "CWE-197", "name": "Numeric Truncation Error" }, "notes": [ { "category": "other", "text": "Numeric Truncation Error", "title": "CWE-197" } ], "references": [ { "category": "self", "summary": "CVE-2024-38044", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38044.json" } ], "title": "CVE-2024-38044" }, { "cve": "CVE-2024-38067", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2024-38067", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38067.json" } ], "title": "CVE-2024-38067" }, { "cve": "CVE-2024-38073", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2024-38073", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38073.json" } ], "title": "CVE-2024-38073" }, { "cve": "CVE-2024-38074", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "references": [ { "category": "self", "summary": "CVE-2024-38074", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38074.json" } ], "title": "CVE-2024-38074" }, { "cve": "CVE-2024-38076", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "references": [ { "category": "self", "summary": "CVE-2024-38076", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38076.json" } ], "title": "CVE-2024-38076" }, { "cve": "CVE-2024-38099", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "other", "text": "Improper Authentication", "title": "CWE-287" } ], "references": [ { "category": "self", "summary": "CVE-2024-38099", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38099.json" } ], "title": "CVE-2024-38099" }, { "cve": "CVE-2024-38059", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2024-38059", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38059.json" } ], "title": "CVE-2024-38059" }, { "cve": "CVE-2024-38080", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "references": [ { "category": "self", "summary": "CVE-2024-38080", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38080.json" } ], "title": "CVE-2024-38080" }, { "cve": "CVE-2024-26184", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "references": [ { "category": "self", "summary": "CVE-2024-26184", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26184.json" } ], "title": "CVE-2024-26184" }, { "cve": "CVE-2024-37977", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "references": [ { "category": "self", "summary": "CVE-2024-37977", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37977.json" } ], "title": "CVE-2024-37977" }, { "cve": "CVE-2024-38032", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "references": [ { "category": "self", "summary": "CVE-2024-38032", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38032.json" } ], "title": "CVE-2024-38032" }, { "cve": "CVE-2024-38078", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2024-38078", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38078.json" } ], "title": "CVE-2024-38078" }, { "cve": "CVE-2024-37985", "references": [ { "category": "self", "summary": "CVE-2024-37985", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37985.json" } ], "title": "CVE-2024-37985" }, { "cve": "CVE-2024-37978", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "references": [ { "category": "self", "summary": "CVE-2024-37978", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37978.json" } ], "title": "CVE-2024-37978" } ] }
ncsc-2024-0282
Vulnerability from csaf_ncscnl
Published
2024-07-09 18:40
Modified
2024-07-09 18:40
Summary
Kwetsbaarheden verholpen in Siemens Producten
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Siemens heeft kwetsbaarheden verholpen in diverse producten als Mendix, RUGGEDOM, SIMATIC, SINEMA, SIPROTEC en de Engineering Platforms voor diverse systemen.
Interpretaties
De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Manipulatie van gegevens
- (Remote) code execution (Administrator/Root rechten)
- (Remote) code execution (Gebruikersrechten)
- Toegang tot systeemgegevens
- Toegang tot gevoelige gegevens
- Verhoogde gebruikersrechten
De kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.
Oplossingen
Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico's zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-121
Stack-based Buffer Overflow
CWE-125
Out-of-bounds Read
CWE-1325
Improperly Controlled Sequential Memory Allocation
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-222
Truncation of Security-relevant Information
CWE-266
Incorrect Privilege Assignment
CWE-267
Privilege Defined With Unsafe Actions
CWE-286
Incorrect User Management
CWE-307
Improper Restriction of Excessive Authentication Attempts
CWE-326
Inadequate Encryption Strength
CWE-359
Exposure of Private Personal Information to an Unauthorized Actor
CWE-378
Creation of Temporary File With Insecure Permissions
CWE-400
Uncontrolled Resource Consumption
CWE-425
Direct Request ('Forced Browsing')
CWE-434
Unrestricted Upload of File with Dangerous Type
CWE-476
NULL Pointer Dereference
CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CWE-502
Deserialization of Untrusted Data
CWE-547
Use of Hard-coded, Security-relevant Constants
CWE-602
Client-Side Enforcement of Server-Side Security
CWE-732
Incorrect Permission Assignment for Critical Resource
CWE-754
Improper Check for Unusual or Exceptional Conditions
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-787
Out-of-bounds Write
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CWE-863
Incorrect Authorization
CWE-916
Use of Password Hash With Insufficient Computational Effort
CWE-924
Improper Enforcement of Message Integrity During Transmission in a Communication Channel
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als Mendix, RUGGEDOM, SIMATIC, SINEMA, SIPROTEC en de Engineering Platforms voor diverse systemen.", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- (Remote) code execution (Administrator/Root rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Toegang tot gevoelige gegevens\n- Verhoogde gebruikersrechten\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.", "title": "Interpretaties" }, { "category": "description", "text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Improperly Controlled Sequential Memory Allocation", "title": "CWE-1325" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Truncation of Security-relevant Information", "title": "CWE-222" }, { "category": "general", "text": "Incorrect Privilege Assignment", "title": "CWE-266" }, { "category": "general", "text": "Privilege Defined With Unsafe Actions", "title": "CWE-267" }, { "category": "general", "text": "Incorrect User Management", "title": "CWE-286" }, { "category": "general", "text": "Improper Restriction of Excessive Authentication Attempts", "title": "CWE-307" }, { "category": "general", "text": "Inadequate Encryption Strength", "title": "CWE-326" }, { "category": "general", "text": "Exposure of Private Personal Information to an Unauthorized Actor", "title": "CWE-359" }, { "category": "general", "text": "Creation of Temporary File With Insecure Permissions", "title": "CWE-378" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Direct Request (\u0027Forced Browsing\u0027)", "title": "CWE-425" }, { "category": "general", "text": "Unrestricted Upload of File with Dangerous Type", "title": "CWE-434" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Exposure of Sensitive System Information to an Unauthorized Control Sphere", "title": "CWE-497" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "Use of Hard-coded, Security-relevant Constants", "title": "CWE-547" }, { "category": "general", "text": "Client-Side Enforcement of Server-Side Security", "title": "CWE-602" }, { "category": "general", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" }, { "category": "general", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" }, { "category": "general", "text": "Incorrect Authorization", "title": "CWE-863" }, { "category": "general", "text": "Use of Password Hash With Insufficient Computational Effort", "title": "CWE-916" }, { "category": "general", "text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel", "title": "CWE-924" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-064222.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-088132.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-170375.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-313039.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-364175.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-381581.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-698820.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-722010.pdf" }, { "category": "external", "summary": "Reference - siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723487.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-750499.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-779936.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-824889.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-868282.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-883918.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-928781.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-998949.pdf" } ], "title": "Kwetsbaarheden verholpen in Siemens Producten", "tracking": { "current_release_date": "2024-07-09T18:40:57.534939Z", "id": "NCSC-2024-0282", "initial_release_date": "2024-07-09T18:40:57.534939Z", "revision_history": [ { "date": "2024-07-09T18:40:57.534939Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "jt_open", "product": { "name": "jt_open", "product_id": "CSAFPID-1497083", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:jt_open:0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mendix_encryption", "product": { "name": "mendix_encryption", "product_id": "CSAFPID-1497113", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:mendix_encryption:v10.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "plm_xml_sdk", "product": { "name": "plm_xml_sdk", "product_id": "CSAFPID-1497084", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:plm_xml_sdk:0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ps_iges_parasolid_translator_component", "product": { "name": "ps_iges_parasolid_translator_component", "product_id": "CSAFPID-1464909", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ps_iges_parasolid_translator_component:0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom_i800", "product": { "name": "ruggedcom_i800", "product_id": "CSAFPID-1496944", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_i800:0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom_i800", "product": { "name": "ruggedcom_i800", "product_id": "CSAFPID-1497438", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom_i800", "product": { "name": "ruggedcom_i800", "product_id": "CSAFPID-1497459", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom_i800", "product": { "name": "ruggedcom_i800", "product_id": "CSAFPID-1497481", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom_i800", "product": { "name": "ruggedcom_i800", "product_id": "CSAFPID-1497482", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom_i800", "product": { "name": "ruggedcom_i800", "product_id": "CSAFPID-1497428", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom_i800", "product": { "name": "ruggedcom_i800", "product_id": "CSAFPID-1497379", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom_i800", "product": { "name": "ruggedcom_i800", "product_id": "CSAFPID-1497388", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom_i800", "product": { "name": "ruggedcom_i800", "product_id": "CSAFPID-1498045", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom_i800", "product": { "name": "ruggedcom_i800", "product_id": "CSAFPID-1497498", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom_i800nc", "product": { "name": "ruggedcom_i800nc", "product_id": "CSAFPID-1496945", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_i800nc:0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom_i800nc", "product": { "name": "ruggedcom_i800nc", "product_id": "CSAFPID-1497536", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_i800nc:4.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom", "product": { "name": "ruggedcom", "product_id": "CSAFPID-1498050", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom:4.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom", "product": { "name": "ruggedcom", "product_id": "CSAFPID-1497507", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom:4.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom", "product": { "name": "ruggedcom", "product_id": "CSAFPID-1498073", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom:4.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom", "product": { "name": "ruggedcom", "product_id": "CSAFPID-1497596", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom:4.3.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom", "product": { "name": "ruggedcom", "product_id": "CSAFPID-1497876", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom:4.3.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom", "product": { "name": "ruggedcom", "product_id": "CSAFPID-1497817", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom:4.3.5:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-32260", "cwe": { "id": "CWE-286", "name": "Incorrect User Management" }, "notes": [ { "category": "other", "text": "Incorrect User Management", "title": "CWE-286" } ], "references": [ { "category": "self", "summary": "CVE-2022-32260", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-32260.json" } ], "title": "CVE-2022-32260" }, { "cve": "CVE-2023-7066", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2023-7066", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7066.json" } ], "title": "CVE-2023-7066" }, { "cve": "CVE-2023-27321", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "other", "text": "Improperly Controlled Sequential Memory Allocation", "title": "CWE-1325" } ], "references": [ { "category": "self", "summary": "CVE-2023-27321", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-27321.json" } ], "title": "CVE-2023-27321" }, { "cve": "CVE-2023-32735", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" } ], "references": [ { "category": "self", "summary": "CVE-2023-32735", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32735.json" } ], "title": "CVE-2023-32735" }, { "cve": "CVE-2023-32737", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" } ], "references": [ { "category": "self", "summary": "CVE-2023-32737", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32737.json" } ], "title": "CVE-2023-32737" }, { "cve": "CVE-2023-46720", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "references": [ { "category": "self", "summary": "CVE-2023-46720", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46720.json" } ], "title": "CVE-2023-46720" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "other", "text": "Truncation of Security-relevant Information", "title": "CWE-222" } ], "references": [ { "category": "self", "summary": "CVE-2023-48795", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json" } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-52237", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1496944", "CSAFPID-1496945" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52237", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52237.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1496944", "CSAFPID-1496945" ] } ], "title": "CVE-2023-52237" }, { "cve": "CVE-2023-52238", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "references": [ { "category": "self", "summary": "CVE-2023-52238", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52238.json" } ], "title": "CVE-2023-52238" }, { "cve": "CVE-2023-52891", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "notes": [ { "category": "other", "text": "Improperly Controlled Sequential Memory Allocation", "title": "CWE-1325" } ], "references": [ { "category": "self", "summary": "CVE-2023-52891", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52891.json" } ], "title": "CVE-2023-52891" }, { "cve": "CVE-2024-21754", "cwe": { "id": "CWE-916", "name": "Use of Password Hash With Insufficient Computational Effort" }, "notes": [ { "category": "other", "text": "Use of Password Hash With Insufficient Computational Effort", "title": "CWE-916" } ], "references": [ { "category": "self", "summary": "CVE-2024-21754", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21754.json" } ], "title": "CVE-2024-21754" }, { "cve": "CVE-2024-23111", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "references": [ { "category": "self", "summary": "CVE-2024-23111", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23111.json" } ], "title": "CVE-2024-23111" }, { "cve": "CVE-2024-26010", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "references": [ { "category": "self", "summary": "CVE-2024-26010", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26010.json" } ], "title": "CVE-2024-26010" }, { "cve": "CVE-2024-30321", "cwe": { "id": "CWE-359", "name": "Exposure of Private Personal Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Private Personal Information to an Unauthorized Actor", "title": "CWE-359" } ], "references": [ { "category": "self", "summary": "CVE-2024-30321", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30321.json" } ], "title": "CVE-2024-30321" }, { "cve": "CVE-2024-32055", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1464909" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32055", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32055.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1464909" ] } ], "title": "CVE-2024-32055" }, { "cve": "CVE-2024-32056", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "references": [ { "category": "self", "summary": "CVE-2024-32056", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32056.json" } ], "title": "CVE-2024-32056" }, { "cve": "CVE-2024-32057", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-1464909" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32057", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32057.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1464909" ] } ], "title": "CVE-2024-32057" }, { "cve": "CVE-2024-32058", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" } ], "product_status": { "known_affected": [ "CSAFPID-1464909" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32058", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32058.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1464909" ] } ], "title": "CVE-2024-32058" }, { "cve": "CVE-2024-32059", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1464909" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32059", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32059.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1464909" ] } ], "title": "CVE-2024-32059" }, { "cve": "CVE-2024-32060", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1464909" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32060", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32060.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1464909" ] } ], "title": "CVE-2024-32060" }, { "cve": "CVE-2024-32061", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1464909" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32061", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32061.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1464909" ] } ], "title": "CVE-2024-32061" }, { "cve": "CVE-2024-32062", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-1464909" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32062", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32062.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1464909" ] } ], "title": "CVE-2024-32062" }, { "cve": "CVE-2024-32063", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-1464909" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32063", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32063.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1464909" ] } ], "title": "CVE-2024-32063" }, { "cve": "CVE-2024-32064", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1464909" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32064", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32064.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1464909" ] } ], "title": "CVE-2024-32064" }, { "cve": "CVE-2024-32065", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1464909" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32065", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32065.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1464909" ] } ], "title": "CVE-2024-32065" }, { "cve": "CVE-2024-32066", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1464909" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32066", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32066.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1464909" ] } ], "title": "CVE-2024-32066" }, { "cve": "CVE-2024-33577", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "references": [ { "category": "self", "summary": "CVE-2024-33577", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33577.json" } ], "title": "CVE-2024-33577" }, { "cve": "CVE-2024-33653", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2024-33653", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33653.json" } ], "title": "CVE-2024-33653" }, { "cve": "CVE-2024-33654", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2024-33654", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33654.json" } ], "title": "CVE-2024-33654" }, { "cve": "CVE-2024-37996", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-1497083", "CSAFPID-1497084" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37996", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37996.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-1497083", "CSAFPID-1497084" ] } ], "title": "CVE-2024-37996" }, { "cve": "CVE-2024-37997", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1497083", "CSAFPID-1497084" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37997", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37997.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1497083", "CSAFPID-1497084" ] } ], "title": "CVE-2024-37997" }, { "cve": "CVE-2024-38278", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "notes": [ { "category": "other", "text": "Incorrect Privilege Assignment", "title": "CWE-266" } ], "references": [ { "category": "self", "summary": "CVE-2024-38278", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38278.json" } ], "title": "CVE-2024-38278" }, { "cve": "CVE-2024-38867", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "other", "text": "Inadequate Encryption Strength", "title": "CWE-326" } ], "references": [ { "category": "self", "summary": "CVE-2024-38867", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38867.json" } ], "title": "CVE-2024-38867" }, { "cve": "CVE-2024-39567", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "references": [ { "category": "self", "summary": "CVE-2024-39567", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39567.json" } ], "title": "CVE-2024-39567" }, { "cve": "CVE-2024-39568", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "references": [ { "category": "self", "summary": "CVE-2024-39568", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39568.json" } ], "title": "CVE-2024-39568" }, { "cve": "CVE-2024-39569", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "references": [ { "category": "self", "summary": "CVE-2024-39569", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39569.json" } ], "title": "CVE-2024-39569" }, { "cve": "CVE-2024-39570", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "references": [ { "category": "self", "summary": "CVE-2024-39570", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39570.json" } ], "title": "CVE-2024-39570" }, { "cve": "CVE-2024-39571", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "references": [ { "category": "self", "summary": "CVE-2024-39571", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39571.json" } ], "title": "CVE-2024-39571" }, { "cve": "CVE-2024-39675", "cwe": { "id": "CWE-497", "name": "Exposure of Sensitive System Information to an Unauthorized Control Sphere" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive System Information to an Unauthorized Control Sphere", "title": "CWE-497" } ], "references": [ { "category": "self", "summary": "CVE-2024-39675", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39675.json" } ], "title": "CVE-2024-39675" }, { "cve": "CVE-2024-39865", "cwe": { "id": "CWE-434", "name": "Unrestricted Upload of File with Dangerous Type" }, "notes": [ { "category": "other", "text": "Unrestricted Upload of File with Dangerous Type", "title": "CWE-434" } ], "references": [ { "category": "self", "summary": "CVE-2024-39865", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39865.json" } ], "title": "CVE-2024-39865" }, { "cve": "CVE-2024-39866", "cwe": { "id": "CWE-267", "name": "Privilege Defined With Unsafe Actions" }, "notes": [ { "category": "other", "text": "Privilege Defined With Unsafe Actions", "title": "CWE-267" } ], "references": [ { "category": "self", "summary": "CVE-2024-39866", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39866.json" } ], "title": "CVE-2024-39866" }, { "cve": "CVE-2024-39867", "cwe": { "id": "CWE-425", "name": "Direct Request (\u0027Forced Browsing\u0027)" }, "notes": [ { "category": "other", "text": "Direct Request (\u0027Forced Browsing\u0027)", "title": "CWE-425" } ], "references": [ { "category": "self", "summary": "CVE-2024-39867", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39867.json" } ], "title": "CVE-2024-39867" }, { "cve": "CVE-2024-39868", "cwe": { "id": "CWE-425", "name": "Direct Request (\u0027Forced Browsing\u0027)" }, "notes": [ { "category": "other", "text": "Direct Request (\u0027Forced Browsing\u0027)", "title": "CWE-425" } ], "references": [ { "category": "self", "summary": "CVE-2024-39868", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39868.json" } ], "title": "CVE-2024-39868" }, { "cve": "CVE-2024-39869", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" } ], "references": [ { "category": "self", "summary": "CVE-2024-39869", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39869.json" } ], "title": "CVE-2024-39869" }, { "cve": "CVE-2024-39870", "cwe": { "id": "CWE-602", "name": "Client-Side Enforcement of Server-Side Security" }, "notes": [ { "category": "other", "text": "Client-Side Enforcement of Server-Side Security", "title": "CWE-602" } ], "references": [ { "category": "self", "summary": "CVE-2024-39870", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39870.json" } ], "title": "CVE-2024-39870" }, { "cve": "CVE-2024-39871", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "notes": [ { "category": "other", "text": "Incorrect Authorization", "title": "CWE-863" } ], "references": [ { "category": "self", "summary": "CVE-2024-39871", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39871.json" } ], "title": "CVE-2024-39871" }, { "cve": "CVE-2024-39872", "cwe": { "id": "CWE-378", "name": "Creation of Temporary File With Insecure Permissions" }, "notes": [ { "category": "other", "text": "Creation of Temporary File With Insecure Permissions", "title": "CWE-378" } ], "references": [ { "category": "self", "summary": "CVE-2024-39872", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39872.json" } ], "title": "CVE-2024-39872" }, { "cve": "CVE-2024-39873", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "notes": [ { "category": "other", "text": "Improper Restriction of Excessive Authentication Attempts", "title": "CWE-307" } ], "references": [ { "category": "self", "summary": "CVE-2024-39873", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39873.json" } ], "title": "CVE-2024-39873" }, { "cve": "CVE-2024-39874", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "notes": [ { "category": "other", "text": "Improper Restriction of Excessive Authentication Attempts", "title": "CWE-307" } ], "references": [ { "category": "self", "summary": "CVE-2024-39874", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39874.json" } ], "title": "CVE-2024-39874" }, { "cve": "CVE-2024-39875", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "other", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" } ], "references": [ { "category": "self", "summary": "CVE-2024-39875", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39875.json" } ], "title": "CVE-2024-39875" }, { "cve": "CVE-2024-39876", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "references": [ { "category": "self", "summary": "CVE-2024-39876", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39876.json" } ], "title": "CVE-2024-39876" }, { "cve": "CVE-2024-39888", "cwe": { "id": "CWE-547", "name": "Use of Hard-coded, Security-relevant Constants" }, "notes": [ { "category": "other", "text": "Use of Hard-coded, Security-relevant Constants", "title": "CWE-547" } ], "product_status": { "known_affected": [ "CSAFPID-1497113" ] }, "references": [ { "category": "self", "summary": "CVE-2024-39888", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39888.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1497113" ] } ], "title": "CVE-2024-39888" }, { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "notes": [ { "category": "other", "text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel", "title": "CWE-924" }, { "category": "other", "text": "Use of Weak Hash", "title": "CWE-328" } ], "references": [ { "category": "self", "summary": "CVE-2024-3596", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-3596.json" } ], "title": "CVE-2024-3596" } ] }
NCSC-2024-0279
Vulnerability from csaf_ncscnl
Published
2024-07-09 18:40
Modified
2024-07-09 18:40
Summary
Kwetsbaarheden verholpen in Microsoft Windows
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Microsoft heeft kwetsbaarheden verholpen in Windows.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Omzeilen van beveiligingsmaatregel
- (Remote) code execution (Administrator/Root rechten)
- (Remote) code execution (Gebruikersrechten)
- SQL Injection
- Toegang tot systeemgegevens
- Verhoogde gebruikersrechten
De ernstigste kwetsbaarheden hebben kenmerk CVE-2024-38076, CVE-2024-38074 en CVE-2024-38076 toegewezen gekregen en bevindt zich in Windows Remote Desktop Licensing Service. Een ongeauthenticeerde kwaadwillende kan de kwetsbaarheid misbruiken om willekeurige code uit te voeren met verhoogde rechten.
```
---
Windows Server Backup:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38013 | 6.70 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows PowerShell:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38043 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-38033 | 7.30 | Verkrijgen van verhoogde rechten |
| CVE-2024-38047 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Remote Desktop:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38015 | 7.50 | Denial-of-Service |
| CVE-2024-38076 | 9.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Image Acquisition:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38022 | 7.00 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Internet Connection Sharing (ICS):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38102 | 6.50 | Denial-of-Service |
| CVE-2024-38053 | 8.80 | Uitvoeren van willekeurige code |
| CVE-2024-38101 | 6.50 | Denial-of-Service |
| CVE-2024-38105 | 6.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Intel:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-37985 | 5.90 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows Online Certificate Status Protocol (OCSP):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38031 | 7.50 | Denial-of-Service |
| CVE-2024-38067 | 7.50 | Denial-of-Service |
| CVE-2024-38068 | 7.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows COM Session:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38100 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Kernel:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38041 | 5.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows Secure Boot:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-28899 | 8.80 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37969 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37970 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37974 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37981 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37986 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37987 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-26184 | 6.80 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37971 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37972 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37973 | 7.80 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37975 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37977 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37978 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37984 | 8.40 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37988 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37989 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-38010 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-38011 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-38065 | 6.80 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Windows Kernel-Mode Drivers:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38062 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Win32 Kernel Subsystem:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38085 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Microsoft Windows Codecs Library:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38055 | 5.50 | Toegang tot gevoelige gegevens |
| CVE-2024-38056 | 5.50 | Toegang tot gevoelige gegevens |
| CVE-2024-38060 | 8.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Workstation Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38050 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows LockDown Policy (WLDP):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38070 | 7.80 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Microsoft Graphics Component:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38051 | 7.80 | Uitvoeren van willekeurige code |
| CVE-2024-38079 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows MultiPoint Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-30013 | 8.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Line Printer Daemon Service (LPD):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38027 | 6.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
NDIS:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38048 | 6.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows CoreMessaging:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-21417 | 8.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Remote Access Connection Manager:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-30071 | 4.70 | Toegang tot gevoelige gegevens |
| CVE-2024-30079 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Cryptographic Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-30098 | 7.50 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Windows Win32K - GRFX:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38066 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Role: Windows Hyper-V:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38080 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
NPS RADIUS Server:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-3596 | 7.50 | Voordoen als andere gebruiker |
|----------------|------|-------------------------------------|
Microsoft Streaming Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38054 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-38052 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-38057 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Remote Desktop Licensing Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38071 | 7.50 | Denial-of-Service |
| CVE-2024-38072 | 7.50 | Denial-of-Service |
| CVE-2024-38077 | 9.80 | Uitvoeren van willekeurige code |
| CVE-2024-38073 | 7.50 | Denial-of-Service |
| CVE-2024-38074 | 9.80 | Uitvoeren van willekeurige code |
| CVE-2024-38099 | 5.90 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows NTLM:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-30081 | 7.10 | Voordoen als andere gebruiker |
|----------------|------|-------------------------------------|
Microsoft WS-Discovery:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38091 | 7.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows Distributed Transaction Coordinator:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38049 | 6.60 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Performance Monitor:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38025 | 7.20 | Uitvoeren van willekeurige code |
| CVE-2024-38019 | 7.20 | Uitvoeren van willekeurige code |
| CVE-2024-38028 | 7.20 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
XBox Crypto Graphic Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38032 | 7.10 | Uitvoeren van willekeurige code |
| CVE-2024-38078 | 7.50 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows iSCSI:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-35270 | 5.30 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows Enroll Engine:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38069 | 7.00 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Windows Fax and Scan Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38104 | 8.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows TCP/IP:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38064 | 7.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows DHCP Server:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38044 | 7.20 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Themes:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38030 | 6.50 | Voordoen als andere gebruiker |
|----------------|------|-------------------------------------|
Windows Message Queuing:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38017 | 5.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows Win32K - ICOMP:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38059 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Active Directory Rights Management Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38517 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-39684 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows BitLocker:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38058 | 6.80 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Role: Active Directory Certificate Services; Active Directory Domain Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38061 | 7.50 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Filtering:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38034 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows MSHTML Platform:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38112 | 7.50 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
---
```
Oplossingen
Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:
https://portal.msrc.microsoft.com/en-us/security-guidance
Dreigingsinformatie
Kans
medium
Schade
high
CWE-121
Stack-based Buffer Overflow
CWE-122
Heap-based Buffer Overflow
CWE-125
Out-of-bounds Read
CWE-126
Buffer Over-read
CWE-130
Improper Handling of Length Parameter Inconsistency
CWE-166
Improper Handling of Missing Special Element
CWE-190
Integer Overflow or Wraparound
CWE-191
Integer Underflow (Wrap or Wraparound)
CWE-197
Numeric Truncation Error
CWE-20
Improper Input Validation
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-284
Improper Access Control
CWE-287
Improper Authentication
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE-328
Use of Weak Hash
CWE-347
Improper Verification of Cryptographic Signature
CWE-400
Uncontrolled Resource Consumption
CWE-415
Double Free
CWE-416
Use After Free
CWE-476
NULL Pointer Dereference
CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE-668
Exposure of Resource to Wrong Sphere
CWE-674
Uncontrolled Recursion
CWE-693
Protection Mechanism Failure
CWE-73
External Control of File Name or Path
CWE-822
Untrusted Pointer Dereference
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CWE-908
Use of Uninitialized Resource
CWE-924
Improper Enforcement of Message Integrity During Transmission in a Communication Channel
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Microsoft heeft kwetsbaarheden verholpen in Windows.\n\n", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Omzeilen van beveiligingsmaatregel\n- (Remote) code execution (Administrator/Root rechten)\n- (Remote) code execution (Gebruikersrechten)\n- SQL Injection\n- Toegang tot systeemgegevens\n- Verhoogde gebruikersrechten\n\n\nDe ernstigste kwetsbaarheden hebben kenmerk CVE-2024-38076, CVE-2024-38074 en CVE-2024-38076 toegewezen gekregen en bevindt zich in Windows Remote Desktop Licensing Service. Een ongeauthenticeerde kwaadwillende kan de kwetsbaarheid misbruiken om willekeurige code uit te voeren met verhoogde rechten. \n\n```\n\n---\nWindows Server Backup: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38013 | 6.70 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows PowerShell: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38043 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38033 | 7.30 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38047 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38015 | 7.50 | Denial-of-Service | \n| CVE-2024-38076 | 9.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Image Acquisition: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38022 | 7.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Internet Connection Sharing (ICS): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38102 | 6.50 | Denial-of-Service | \n| CVE-2024-38053 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38101 | 6.50 | Denial-of-Service | \n| CVE-2024-38105 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nIntel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-37985 | 5.90 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Online Certificate Status Protocol (OCSP): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38031 | 7.50 | Denial-of-Service | \n| CVE-2024-38067 | 7.50 | Denial-of-Service | \n| CVE-2024-38068 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows COM Session: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38100 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Kernel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38041 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Secure Boot: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-28899 | 8.80 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37969 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37970 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37974 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37981 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37986 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37987 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-26184 | 6.80 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37971 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37972 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37973 | 7.80 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37975 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37977 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37978 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37984 | 8.40 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37988 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37989 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-38010 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-38011 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-38065 | 6.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Kernel-Mode Drivers: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38062 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Win32 Kernel Subsystem: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38085 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Windows Codecs Library: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38055 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2024-38056 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2024-38060 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Workstation Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38050 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows LockDown Policy (WLDP): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38070 | 7.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nMicrosoft Graphics Component: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38051 | 7.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38079 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows MultiPoint Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30013 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nLine Printer Daemon Service (LPD): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38027 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nNDIS: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38048 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows CoreMessaging: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-21417 | 8.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Remote Access Connection Manager: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30071 | 4.70 | Toegang tot gevoelige gegevens | \n| CVE-2024-30079 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Cryptographic Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30098 | 7.50 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - GRFX: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38066 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nRole: Windows Hyper-V: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38080 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nNPS RADIUS Server: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-3596 | 7.50 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nMicrosoft Streaming Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38054 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38052 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38057 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop Licensing Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38071 | 7.50 | Denial-of-Service | \n| CVE-2024-38072 | 7.50 | Denial-of-Service | \n| CVE-2024-38077 | 9.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38073 | 7.50 | Denial-of-Service | \n| CVE-2024-38074 | 9.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38099 | 5.90 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows NTLM: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30081 | 7.10 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nMicrosoft WS-Discovery: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38091 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Distributed Transaction Coordinator: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38049 | 6.60 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Performance Monitor: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38025 | 7.20 | Uitvoeren van willekeurige code | \n| CVE-2024-38019 | 7.20 | Uitvoeren van willekeurige code | \n| CVE-2024-38028 | 7.20 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nXBox Crypto Graphic Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38032 | 7.10 | Uitvoeren van willekeurige code | \n| CVE-2024-38078 | 7.50 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows iSCSI: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-35270 | 5.30 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Enroll Engine: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38069 | 7.00 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Fax and Scan Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38104 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows TCP/IP: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38064 | 7.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows DHCP Server: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38044 | 7.20 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Themes: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38030 | 6.50 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nWindows Message Queuing: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38017 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - ICOMP: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38059 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nActive Directory Rights Management Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38517 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-39684 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\n\nWindows BitLocker: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38058 | 6.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nRole: Active Directory Certificate Services; Active Directory Domain Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38061 | 7.50 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Filtering: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38034 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows MSHTML Platform: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38112 | 7.50 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\n\n---\n\n```", "title": "Interpretaties" }, { "category": "description", "text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance", "title": "Oplossingen" }, { "category": "description", "text": " ", "title": "Dreigingsinformatie" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Buffer Over-read", "title": "CWE-126" }, { "category": "general", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" }, { "category": "general", "text": "Improper Handling of Missing Special Element", "title": "CWE-166" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" }, { "category": "general", "text": "Numeric Truncation Error", "title": "CWE-197" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Authentication", "title": "CWE-287" }, { "category": "general", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" }, { "category": "general", "text": "Use of Weak Hash", "title": "CWE-328" }, { "category": "general", "text": "Improper Verification of Cryptographic Signature", "title": "CWE-347" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Double Free", "title": "CWE-415" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" }, { "category": "general", "text": "Exposure of Resource to Wrong Sphere", "title": "CWE-668" }, { "category": "general", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "Protection Mechanism Failure", "title": "CWE-693" }, { "category": "general", "text": "External Control of File Name or Path", "title": "CWE-73" }, { "category": "general", "text": "Untrusted Pointer Dereference", "title": "CWE-822" }, { "category": "general", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" }, { "category": "general", "text": "Use of Uninitialized Resource", "title": "CWE-908" }, { "category": "general", "text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel", "title": "CWE-924" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "title": "Kwetsbaarheden verholpen in Microsoft Windows", "tracking": { "current_release_date": "2024-07-09T18:40:21.043319Z", "id": "NCSC-2024-0279", "initial_release_date": "2024-07-09T18:40:21.043319Z", "revision_history": [ { "date": "2024-07-09T18:40:21.043319Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "rfc", "product": { "name": "rfc", "product_id": "CSAFPID-1497114", "product_identification_helper": { "cpe": "cpe:2.3:a:ietf:rfc:2865:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "ietf" }, { "branches": [ { "category": "product_name", "name": "windows_10_version_1507", "product": { "name": "windows_10_version_1507", "product_id": "CSAFPID-1453769", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_10_version_1507:10.0.0:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "microsoft" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-21417", "references": [ { "category": "self", "summary": "CVE-2024-21417", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21417.json" } ], "title": "CVE-2024-21417" }, { "cve": "CVE-2024-28899", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28899", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28899.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-28899" }, { "cve": "CVE-2024-30081", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-30081", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30081.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-30081" }, { "cve": "CVE-2024-30098", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "other", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-30098", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30098.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-30098" }, { "cve": "CVE-2024-35270", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-35270", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35270.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-35270" }, { "cve": "CVE-2024-37969", "cwe": { "id": "CWE-822", "name": "Untrusted Pointer Dereference" }, "notes": [ { "category": "other", "text": "Untrusted Pointer Dereference", "title": "CWE-822" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37969", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37969.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37969" }, { "cve": "CVE-2024-37970", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37970", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37970.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37970" }, { "cve": "CVE-2024-37974", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37974", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37974.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37974" }, { "cve": "CVE-2024-37981", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "references": [ { "category": "self", "summary": "CVE-2024-37981", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37981.json" } ], "title": "CVE-2024-37981" }, { "cve": "CVE-2024-37986", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37986", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37986.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37986" }, { "cve": "CVE-2024-37987", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37987", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37987.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37987" }, { "cve": "CVE-2024-38013", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "other", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38013", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38013.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38013" }, { "cve": "CVE-2024-38022", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "other", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38022", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38022.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38022" }, { "cve": "CVE-2024-38025", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38025", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38025.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38025" }, { "cve": "CVE-2024-38034", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38034", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38034.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38034" }, { "cve": "CVE-2024-38041", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "references": [ { "category": "self", "summary": "CVE-2024-38041", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38041.json" } ], "title": "CVE-2024-38041" }, { "cve": "CVE-2024-38043", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2024-38043", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38043.json" } ], "title": "CVE-2024-38043" }, { "cve": "CVE-2024-38517", "references": [ { "category": "self", "summary": "CVE-2024-38517", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38517.json" } ], "title": "CVE-2024-38517" }, { "cve": "CVE-2024-38051", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38051", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38051.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38051" }, { "cve": "CVE-2024-38054", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38054", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38054.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38054" }, { "cve": "CVE-2024-38055", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38055", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38055.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38055" }, { "cve": "CVE-2024-38056", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38056", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38056.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38056" }, { "cve": "CVE-2024-38060", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38060", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38060.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38060" }, { "cve": "CVE-2024-38061", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38061", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38061.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38061" }, { "cve": "CVE-2024-38062", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2024-38062", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38062.json" } ], "title": "CVE-2024-38062" }, { "cve": "CVE-2024-38064", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "other", "text": "Use of Uninitialized Resource", "title": "CWE-908" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38064", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38064.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38064" }, { "cve": "CVE-2024-38085", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38085", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38085.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38085" }, { "cve": "CVE-2024-38091", "cwe": { "id": "CWE-166", "name": "Improper Handling of Missing Special Element" }, "notes": [ { "category": "other", "text": "Improper Handling of Missing Special Element", "title": "CWE-166" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38091", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38091.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38091" }, { "cve": "CVE-2024-38102", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38102", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38102.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38102" }, { "cve": "CVE-2024-38104", "cwe": { "id": "CWE-822", "name": "Untrusted Pointer Dereference" }, "notes": [ { "category": "other", "text": "Untrusted Pointer Dereference", "title": "CWE-822" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38104", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38104.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38104" }, { "cve": "CVE-2024-30013", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "other", "text": "Double Free", "title": "CWE-415" } ], "references": [ { "category": "self", "summary": "CVE-2024-30013", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30013.json" } ], "title": "CVE-2024-30013" }, { "cve": "CVE-2024-30071", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-30071", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30071.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-30071" }, { "cve": "CVE-2024-30079", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-30079", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30079.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-30079" }, { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "notes": [ { "category": "other", "text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel", "title": "CWE-924" }, { "category": "other", "text": "Use of Weak Hash", "title": "CWE-328" } ], "product_status": { "known_affected": [ "CSAFPID-1497114" ] }, "references": [ { "category": "self", "summary": "CVE-2024-3596", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-3596.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1497114" ] } ], "title": "CVE-2024-3596" }, { "cve": "CVE-2024-37971", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37971", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37971.json" } ], "title": "CVE-2024-37971" }, { "cve": "CVE-2024-37972", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37972", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37972.json" } ], "title": "CVE-2024-37972" }, { "cve": "CVE-2024-37973", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "other", "text": "Uncontrolled Recursion", "title": "CWE-674" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37973", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37973.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37973" }, { "cve": "CVE-2024-37975", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37975", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37975.json" } ], "title": "CVE-2024-37975" }, { "cve": "CVE-2024-37984", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37984", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37984.json" } ], "title": "CVE-2024-37984" }, { "cve": "CVE-2024-37988", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37988", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37988.json" } ], "title": "CVE-2024-37988" }, { "cve": "CVE-2024-37989", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37989", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37989.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37989" }, { "cve": "CVE-2024-38010", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38010", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38010.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38010" }, { "cve": "CVE-2024-38011", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38011", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38011.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38011" }, { "cve": "CVE-2024-38017", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38017", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38017.json" } ], "title": "CVE-2024-38017" }, { "cve": "CVE-2024-38019", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38019", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38019.json" } ], "title": "CVE-2024-38019" }, { "cve": "CVE-2024-38027", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38027", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38027.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38027" }, { "cve": "CVE-2024-38028", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38028", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38028.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38028" }, { "cve": "CVE-2024-38030", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38030", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38030.json" } ], "title": "CVE-2024-38030" }, { "cve": "CVE-2024-38033", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38033", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38033.json" } ], "title": "CVE-2024-38033" }, { "cve": "CVE-2024-38047", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2024-38047", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38047.json" } ], "title": "CVE-2024-38047" }, { "cve": "CVE-2024-38048", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38048", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38048.json" } ], "title": "CVE-2024-38048" }, { "cve": "CVE-2024-38049", "cwe": { "id": "CWE-73", "name": "External Control of File Name or Path" }, "notes": [ { "category": "other", "text": "External Control of File Name or Path", "title": "CWE-73" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38049", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38049.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38049" }, { "cve": "CVE-2024-38050", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38050", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38050.json" } ], "title": "CVE-2024-38050" }, { "cve": "CVE-2024-38052", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38052", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38052.json" } ], "title": "CVE-2024-38052" }, { "cve": "CVE-2024-38053", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38053", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38053.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38053" }, { "cve": "CVE-2024-38057", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38057", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38057.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38057" }, { "cve": "CVE-2024-38058", "cwe": { "id": "CWE-693", "name": "Protection Mechanism Failure" }, "notes": [ { "category": "other", "text": "Protection Mechanism Failure", "title": "CWE-693" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38058", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38058.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38058" }, { "cve": "CVE-2024-38065", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38065", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38065.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38065" }, { "cve": "CVE-2024-38066", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38066", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38066.json" } ], "title": "CVE-2024-38066" }, { "cve": "CVE-2024-38068", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38068", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38068.json" } ], "title": "CVE-2024-38068" }, { "cve": "CVE-2024-38069", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "notes": [ { "category": "other", "text": "Improper Verification of Cryptographic Signature", "title": "CWE-347" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38069", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38069.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38069" }, { "cve": "CVE-2024-38070", "cwe": { "id": "CWE-693", "name": "Protection Mechanism Failure" }, "notes": [ { "category": "other", "text": "Protection Mechanism Failure", "title": "CWE-693" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38070", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38070.json" } ], "title": "CVE-2024-38070" }, { "cve": "CVE-2024-38079", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38079", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38079.json" } ], "title": "CVE-2024-38079" }, { "cve": "CVE-2024-38101", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38101", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38101.json" } ], "title": "CVE-2024-38101" }, { "cve": "CVE-2024-38105", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38105", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38105.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38105" }, { "cve": "CVE-2024-39684", "references": [ { "category": "self", "summary": "CVE-2024-39684", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39684.json" } ], "title": "CVE-2024-39684" }, { "cve": "CVE-2024-38015", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2024-38015", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38015.json" } ], "title": "CVE-2024-38015" }, { "cve": "CVE-2024-38071", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" } ], "references": [ { "category": "self", "summary": "CVE-2024-38071", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38071.json" } ], "title": "CVE-2024-38071" }, { "cve": "CVE-2024-38072", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2024-38072", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38072.json" } ], "title": "CVE-2024-38072" }, { "cve": "CVE-2024-38077", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "references": [ { "category": "self", "summary": "CVE-2024-38077", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38077.json" } ], "title": "CVE-2024-38077" }, { "cve": "CVE-2024-38100", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "references": [ { "category": "self", "summary": "CVE-2024-38100", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38100.json" } ], "title": "CVE-2024-38100" }, { "cve": "CVE-2024-38031", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2024-38031", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38031.json" } ], "title": "CVE-2024-38031" }, { "cve": "CVE-2024-38044", "cwe": { "id": "CWE-197", "name": "Numeric Truncation Error" }, "notes": [ { "category": "other", "text": "Numeric Truncation Error", "title": "CWE-197" } ], "references": [ { "category": "self", "summary": "CVE-2024-38044", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38044.json" } ], "title": "CVE-2024-38044" }, { "cve": "CVE-2024-38067", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2024-38067", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38067.json" } ], "title": "CVE-2024-38067" }, { "cve": "CVE-2024-38073", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2024-38073", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38073.json" } ], "title": "CVE-2024-38073" }, { "cve": "CVE-2024-38074", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "references": [ { "category": "self", "summary": "CVE-2024-38074", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38074.json" } ], "title": "CVE-2024-38074" }, { "cve": "CVE-2024-38076", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "references": [ { "category": "self", "summary": "CVE-2024-38076", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38076.json" } ], "title": "CVE-2024-38076" }, { "cve": "CVE-2024-38099", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "other", "text": "Improper Authentication", "title": "CWE-287" } ], "references": [ { "category": "self", "summary": "CVE-2024-38099", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38099.json" } ], "title": "CVE-2024-38099" }, { "cve": "CVE-2024-38059", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2024-38059", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38059.json" } ], "title": "CVE-2024-38059" }, { "cve": "CVE-2024-38080", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "references": [ { "category": "self", "summary": "CVE-2024-38080", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38080.json" } ], "title": "CVE-2024-38080" }, { "cve": "CVE-2024-26184", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "references": [ { "category": "self", "summary": "CVE-2024-26184", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26184.json" } ], "title": "CVE-2024-26184" }, { "cve": "CVE-2024-37977", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "references": [ { "category": "self", "summary": "CVE-2024-37977", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37977.json" } ], "title": "CVE-2024-37977" }, { "cve": "CVE-2024-38032", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "references": [ { "category": "self", "summary": "CVE-2024-38032", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38032.json" } ], "title": "CVE-2024-38032" }, { "cve": "CVE-2024-38078", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2024-38078", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38078.json" } ], "title": "CVE-2024-38078" }, { "cve": "CVE-2024-37985", "references": [ { "category": "self", "summary": "CVE-2024-37985", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37985.json" } ], "title": "CVE-2024-37985" }, { "cve": "CVE-2024-37978", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "references": [ { "category": "self", "summary": "CVE-2024-37978", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37978.json" } ], "title": "CVE-2024-37978" } ] }
NCSC-2024-0282
Vulnerability from csaf_ncscnl
Published
2024-07-09 18:40
Modified
2024-07-09 18:40
Summary
Kwetsbaarheden verholpen in Siemens Producten
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Siemens heeft kwetsbaarheden verholpen in diverse producten als Mendix, RUGGEDOM, SIMATIC, SINEMA, SIPROTEC en de Engineering Platforms voor diverse systemen.
Interpretaties
De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Manipulatie van gegevens
- (Remote) code execution (Administrator/Root rechten)
- (Remote) code execution (Gebruikersrechten)
- Toegang tot systeemgegevens
- Toegang tot gevoelige gegevens
- Verhoogde gebruikersrechten
De kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.
Oplossingen
Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico's zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-121
Stack-based Buffer Overflow
CWE-125
Out-of-bounds Read
CWE-1325
Improperly Controlled Sequential Memory Allocation
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-222
Truncation of Security-relevant Information
CWE-266
Incorrect Privilege Assignment
CWE-267
Privilege Defined With Unsafe Actions
CWE-286
Incorrect User Management
CWE-307
Improper Restriction of Excessive Authentication Attempts
CWE-326
Inadequate Encryption Strength
CWE-359
Exposure of Private Personal Information to an Unauthorized Actor
CWE-378
Creation of Temporary File With Insecure Permissions
CWE-400
Uncontrolled Resource Consumption
CWE-425
Direct Request ('Forced Browsing')
CWE-434
Unrestricted Upload of File with Dangerous Type
CWE-476
NULL Pointer Dereference
CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CWE-502
Deserialization of Untrusted Data
CWE-547
Use of Hard-coded, Security-relevant Constants
CWE-602
Client-Side Enforcement of Server-Side Security
CWE-732
Incorrect Permission Assignment for Critical Resource
CWE-754
Improper Check for Unusual or Exceptional Conditions
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-787
Out-of-bounds Write
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CWE-863
Incorrect Authorization
CWE-916
Use of Password Hash With Insufficient Computational Effort
CWE-924
Improper Enforcement of Message Integrity During Transmission in a Communication Channel
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als Mendix, RUGGEDOM, SIMATIC, SINEMA, SIPROTEC en de Engineering Platforms voor diverse systemen.", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- (Remote) code execution (Administrator/Root rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Toegang tot gevoelige gegevens\n- Verhoogde gebruikersrechten\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.", "title": "Interpretaties" }, { "category": "description", "text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Improperly Controlled Sequential Memory Allocation", "title": "CWE-1325" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Truncation of Security-relevant Information", "title": "CWE-222" }, { "category": "general", "text": "Incorrect Privilege Assignment", "title": "CWE-266" }, { "category": "general", "text": "Privilege Defined With Unsafe Actions", "title": "CWE-267" }, { "category": "general", "text": "Incorrect User Management", "title": "CWE-286" }, { "category": "general", "text": "Improper Restriction of Excessive Authentication Attempts", "title": "CWE-307" }, { "category": "general", "text": "Inadequate Encryption Strength", "title": "CWE-326" }, { "category": "general", "text": "Exposure of Private Personal Information to an Unauthorized Actor", "title": "CWE-359" }, { "category": "general", "text": "Creation of Temporary File With Insecure Permissions", "title": "CWE-378" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Direct Request (\u0027Forced Browsing\u0027)", "title": "CWE-425" }, { "category": "general", "text": "Unrestricted Upload of File with Dangerous Type", "title": "CWE-434" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Exposure of Sensitive System Information to an Unauthorized Control Sphere", "title": "CWE-497" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "Use of Hard-coded, Security-relevant Constants", "title": "CWE-547" }, { "category": "general", "text": "Client-Side Enforcement of Server-Side Security", "title": "CWE-602" }, { "category": "general", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" }, { "category": "general", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" }, { "category": "general", "text": "Incorrect Authorization", "title": "CWE-863" }, { "category": "general", "text": "Use of Password Hash With Insufficient Computational Effort", "title": "CWE-916" }, { "category": "general", "text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel", "title": "CWE-924" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-064222.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-088132.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-170375.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-313039.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-364175.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-381581.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-698820.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-722010.pdf" }, { "category": "external", "summary": "Reference - siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723487.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-750499.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-779936.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-824889.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-868282.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-883918.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-928781.pdf" }, { "category": "external", "summary": "Reference - ncscclear; siemens", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-998949.pdf" } ], "title": "Kwetsbaarheden verholpen in Siemens Producten", "tracking": { "current_release_date": "2024-07-09T18:40:57.534939Z", "id": "NCSC-2024-0282", "initial_release_date": "2024-07-09T18:40:57.534939Z", "revision_history": [ { "date": "2024-07-09T18:40:57.534939Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "jt_open", "product": { "name": "jt_open", "product_id": "CSAFPID-1497083", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:jt_open:0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mendix_encryption", "product": { "name": "mendix_encryption", "product_id": "CSAFPID-1497113", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:mendix_encryption:v10.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "plm_xml_sdk", "product": { "name": "plm_xml_sdk", "product_id": "CSAFPID-1497084", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:plm_xml_sdk:0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ps_iges_parasolid_translator_component", "product": { "name": "ps_iges_parasolid_translator_component", "product_id": "CSAFPID-1464909", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ps_iges_parasolid_translator_component:0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom_i800", "product": { "name": "ruggedcom_i800", "product_id": "CSAFPID-1496944", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_i800:0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom_i800", "product": { "name": "ruggedcom_i800", "product_id": "CSAFPID-1497438", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom_i800", "product": { "name": "ruggedcom_i800", "product_id": "CSAFPID-1497459", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom_i800", "product": { "name": "ruggedcom_i800", "product_id": "CSAFPID-1497481", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom_i800", "product": { "name": "ruggedcom_i800", "product_id": "CSAFPID-1497482", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom_i800", "product": { "name": "ruggedcom_i800", "product_id": "CSAFPID-1497428", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom_i800", "product": { "name": "ruggedcom_i800", "product_id": "CSAFPID-1497379", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom_i800", "product": { "name": "ruggedcom_i800", "product_id": "CSAFPID-1497388", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom_i800", "product": { "name": "ruggedcom_i800", "product_id": "CSAFPID-1498045", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom_i800", "product": { "name": "ruggedcom_i800", "product_id": "CSAFPID-1497498", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_i800:4.3.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom_i800nc", "product": { "name": "ruggedcom_i800nc", "product_id": "CSAFPID-1496945", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_i800nc:0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom_i800nc", "product": { "name": "ruggedcom_i800nc", "product_id": "CSAFPID-1497536", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom_i800nc:4.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom", "product": { "name": "ruggedcom", "product_id": "CSAFPID-1498050", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom:4.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom", "product": { "name": "ruggedcom", "product_id": "CSAFPID-1497507", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom:4.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom", "product": { "name": "ruggedcom", "product_id": "CSAFPID-1498073", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom:4.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom", "product": { "name": "ruggedcom", "product_id": "CSAFPID-1497596", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom:4.3.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom", "product": { "name": "ruggedcom", "product_id": "CSAFPID-1497876", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom:4.3.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ruggedcom", "product": { "name": "ruggedcom", "product_id": "CSAFPID-1497817", "product_identification_helper": { "cpe": "cpe:2.3:a:siemens:ruggedcom:4.3.5:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-32260", "cwe": { "id": "CWE-286", "name": "Incorrect User Management" }, "notes": [ { "category": "other", "text": "Incorrect User Management", "title": "CWE-286" } ], "references": [ { "category": "self", "summary": "CVE-2022-32260", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-32260.json" } ], "title": "CVE-2022-32260" }, { "cve": "CVE-2023-7066", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2023-7066", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7066.json" } ], "title": "CVE-2023-7066" }, { "cve": "CVE-2023-27321", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "other", "text": "Improperly Controlled Sequential Memory Allocation", "title": "CWE-1325" } ], "references": [ { "category": "self", "summary": "CVE-2023-27321", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-27321.json" } ], "title": "CVE-2023-27321" }, { "cve": "CVE-2023-32735", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" } ], "references": [ { "category": "self", "summary": "CVE-2023-32735", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32735.json" } ], "title": "CVE-2023-32735" }, { "cve": "CVE-2023-32737", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" } ], "references": [ { "category": "self", "summary": "CVE-2023-32737", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32737.json" } ], "title": "CVE-2023-32737" }, { "cve": "CVE-2023-46720", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "references": [ { "category": "self", "summary": "CVE-2023-46720", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46720.json" } ], "title": "CVE-2023-46720" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "other", "text": "Truncation of Security-relevant Information", "title": "CWE-222" } ], "references": [ { "category": "self", "summary": "CVE-2023-48795", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json" } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-52237", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1496944", "CSAFPID-1496945" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52237", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52237.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1496944", "CSAFPID-1496945" ] } ], "title": "CVE-2023-52237" }, { "cve": "CVE-2023-52238", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "references": [ { "category": "self", "summary": "CVE-2023-52238", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52238.json" } ], "title": "CVE-2023-52238" }, { "cve": "CVE-2023-52891", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "notes": [ { "category": "other", "text": "Improperly Controlled Sequential Memory Allocation", "title": "CWE-1325" } ], "references": [ { "category": "self", "summary": "CVE-2023-52891", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52891.json" } ], "title": "CVE-2023-52891" }, { "cve": "CVE-2024-21754", "cwe": { "id": "CWE-916", "name": "Use of Password Hash With Insufficient Computational Effort" }, "notes": [ { "category": "other", "text": "Use of Password Hash With Insufficient Computational Effort", "title": "CWE-916" } ], "references": [ { "category": "self", "summary": "CVE-2024-21754", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21754.json" } ], "title": "CVE-2024-21754" }, { "cve": "CVE-2024-23111", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "references": [ { "category": "self", "summary": "CVE-2024-23111", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23111.json" } ], "title": "CVE-2024-23111" }, { "cve": "CVE-2024-26010", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "references": [ { "category": "self", "summary": "CVE-2024-26010", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26010.json" } ], "title": "CVE-2024-26010" }, { "cve": "CVE-2024-30321", "cwe": { "id": "CWE-359", "name": "Exposure of Private Personal Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Private Personal Information to an Unauthorized Actor", "title": "CWE-359" } ], "references": [ { "category": "self", "summary": "CVE-2024-30321", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30321.json" } ], "title": "CVE-2024-30321" }, { "cve": "CVE-2024-32055", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1464909" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32055", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32055.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1464909" ] } ], "title": "CVE-2024-32055" }, { "cve": "CVE-2024-32056", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "references": [ { "category": "self", "summary": "CVE-2024-32056", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32056.json" } ], "title": "CVE-2024-32056" }, { "cve": "CVE-2024-32057", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-1464909" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32057", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32057.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1464909" ] } ], "title": "CVE-2024-32057" }, { "cve": "CVE-2024-32058", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" } ], "product_status": { "known_affected": [ "CSAFPID-1464909" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32058", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32058.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1464909" ] } ], "title": "CVE-2024-32058" }, { "cve": "CVE-2024-32059", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1464909" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32059", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32059.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1464909" ] } ], "title": "CVE-2024-32059" }, { "cve": "CVE-2024-32060", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1464909" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32060", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32060.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1464909" ] } ], "title": "CVE-2024-32060" }, { "cve": "CVE-2024-32061", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1464909" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32061", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32061.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1464909" ] } ], "title": "CVE-2024-32061" }, { "cve": "CVE-2024-32062", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-1464909" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32062", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32062.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1464909" ] } ], "title": "CVE-2024-32062" }, { "cve": "CVE-2024-32063", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-1464909" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32063", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32063.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1464909" ] } ], "title": "CVE-2024-32063" }, { "cve": "CVE-2024-32064", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1464909" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32064", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32064.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1464909" ] } ], "title": "CVE-2024-32064" }, { "cve": "CVE-2024-32065", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1464909" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32065", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32065.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1464909" ] } ], "title": "CVE-2024-32065" }, { "cve": "CVE-2024-32066", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1464909" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32066", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32066.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1464909" ] } ], "title": "CVE-2024-32066" }, { "cve": "CVE-2024-33577", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "references": [ { "category": "self", "summary": "CVE-2024-33577", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33577.json" } ], "title": "CVE-2024-33577" }, { "cve": "CVE-2024-33653", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2024-33653", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33653.json" } ], "title": "CVE-2024-33653" }, { "cve": "CVE-2024-33654", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2024-33654", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33654.json" } ], "title": "CVE-2024-33654" }, { "cve": "CVE-2024-37996", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-1497083", "CSAFPID-1497084" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37996", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37996.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-1497083", "CSAFPID-1497084" ] } ], "title": "CVE-2024-37996" }, { "cve": "CVE-2024-37997", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1497083", "CSAFPID-1497084" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37997", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37997.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1497083", "CSAFPID-1497084" ] } ], "title": "CVE-2024-37997" }, { "cve": "CVE-2024-38278", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "notes": [ { "category": "other", "text": "Incorrect Privilege Assignment", "title": "CWE-266" } ], "references": [ { "category": "self", "summary": "CVE-2024-38278", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38278.json" } ], "title": "CVE-2024-38278" }, { "cve": "CVE-2024-38867", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "other", "text": "Inadequate Encryption Strength", "title": "CWE-326" } ], "references": [ { "category": "self", "summary": "CVE-2024-38867", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38867.json" } ], "title": "CVE-2024-38867" }, { "cve": "CVE-2024-39567", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "references": [ { "category": "self", "summary": "CVE-2024-39567", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39567.json" } ], "title": "CVE-2024-39567" }, { "cve": "CVE-2024-39568", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "references": [ { "category": "self", "summary": "CVE-2024-39568", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39568.json" } ], "title": "CVE-2024-39568" }, { "cve": "CVE-2024-39569", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "references": [ { "category": "self", "summary": "CVE-2024-39569", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39569.json" } ], "title": "CVE-2024-39569" }, { "cve": "CVE-2024-39570", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "references": [ { "category": "self", "summary": "CVE-2024-39570", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39570.json" } ], "title": "CVE-2024-39570" }, { "cve": "CVE-2024-39571", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "references": [ { "category": "self", "summary": "CVE-2024-39571", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39571.json" } ], "title": "CVE-2024-39571" }, { "cve": "CVE-2024-39675", "cwe": { "id": "CWE-497", "name": "Exposure of Sensitive System Information to an Unauthorized Control Sphere" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive System Information to an Unauthorized Control Sphere", "title": "CWE-497" } ], "references": [ { "category": "self", "summary": "CVE-2024-39675", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39675.json" } ], "title": "CVE-2024-39675" }, { "cve": "CVE-2024-39865", "cwe": { "id": "CWE-434", "name": "Unrestricted Upload of File with Dangerous Type" }, "notes": [ { "category": "other", "text": "Unrestricted Upload of File with Dangerous Type", "title": "CWE-434" } ], "references": [ { "category": "self", "summary": "CVE-2024-39865", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39865.json" } ], "title": "CVE-2024-39865" }, { "cve": "CVE-2024-39866", "cwe": { "id": "CWE-267", "name": "Privilege Defined With Unsafe Actions" }, "notes": [ { "category": "other", "text": "Privilege Defined With Unsafe Actions", "title": "CWE-267" } ], "references": [ { "category": "self", "summary": "CVE-2024-39866", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39866.json" } ], "title": "CVE-2024-39866" }, { "cve": "CVE-2024-39867", "cwe": { "id": "CWE-425", "name": "Direct Request (\u0027Forced Browsing\u0027)" }, "notes": [ { "category": "other", "text": "Direct Request (\u0027Forced Browsing\u0027)", "title": "CWE-425" } ], "references": [ { "category": "self", "summary": "CVE-2024-39867", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39867.json" } ], "title": "CVE-2024-39867" }, { "cve": "CVE-2024-39868", "cwe": { "id": "CWE-425", "name": "Direct Request (\u0027Forced Browsing\u0027)" }, "notes": [ { "category": "other", "text": "Direct Request (\u0027Forced Browsing\u0027)", "title": "CWE-425" } ], "references": [ { "category": "self", "summary": "CVE-2024-39868", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39868.json" } ], "title": "CVE-2024-39868" }, { "cve": "CVE-2024-39869", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" } ], "references": [ { "category": "self", "summary": "CVE-2024-39869", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39869.json" } ], "title": "CVE-2024-39869" }, { "cve": "CVE-2024-39870", "cwe": { "id": "CWE-602", "name": "Client-Side Enforcement of Server-Side Security" }, "notes": [ { "category": "other", "text": "Client-Side Enforcement of Server-Side Security", "title": "CWE-602" } ], "references": [ { "category": "self", "summary": "CVE-2024-39870", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39870.json" } ], "title": "CVE-2024-39870" }, { "cve": "CVE-2024-39871", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "notes": [ { "category": "other", "text": "Incorrect Authorization", "title": "CWE-863" } ], "references": [ { "category": "self", "summary": "CVE-2024-39871", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39871.json" } ], "title": "CVE-2024-39871" }, { "cve": "CVE-2024-39872", "cwe": { "id": "CWE-378", "name": "Creation of Temporary File With Insecure Permissions" }, "notes": [ { "category": "other", "text": "Creation of Temporary File With Insecure Permissions", "title": "CWE-378" } ], "references": [ { "category": "self", "summary": "CVE-2024-39872", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39872.json" } ], "title": "CVE-2024-39872" }, { "cve": "CVE-2024-39873", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "notes": [ { "category": "other", "text": "Improper Restriction of Excessive Authentication Attempts", "title": "CWE-307" } ], "references": [ { "category": "self", "summary": "CVE-2024-39873", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39873.json" } ], "title": "CVE-2024-39873" }, { "cve": "CVE-2024-39874", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "notes": [ { "category": "other", "text": "Improper Restriction of Excessive Authentication Attempts", "title": "CWE-307" } ], "references": [ { "category": "self", "summary": "CVE-2024-39874", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39874.json" } ], "title": "CVE-2024-39874" }, { "cve": "CVE-2024-39875", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "other", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" } ], "references": [ { "category": "self", "summary": "CVE-2024-39875", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39875.json" } ], "title": "CVE-2024-39875" }, { "cve": "CVE-2024-39876", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "references": [ { "category": "self", "summary": "CVE-2024-39876", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39876.json" } ], "title": "CVE-2024-39876" }, { "cve": "CVE-2024-39888", "cwe": { "id": "CWE-547", "name": "Use of Hard-coded, Security-relevant Constants" }, "notes": [ { "category": "other", "text": "Use of Hard-coded, Security-relevant Constants", "title": "CWE-547" } ], "product_status": { "known_affected": [ "CSAFPID-1497113" ] }, "references": [ { "category": "self", "summary": "CVE-2024-39888", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39888.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1497113" ] } ], "title": "CVE-2024-39888" }, { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "notes": [ { "category": "other", "text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel", "title": "CWE-924" }, { "category": "other", "text": "Use of Weak Hash", "title": "CWE-328" } ], "references": [ { "category": "self", "summary": "CVE-2024-3596", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-3596.json" } ], "title": "CVE-2024-3596" } ] }
cisco-sa-radius-spoofing-july-2024-87ccdwz3
Vulnerability from csaf_cisco
Published
2024-07-10 16:00
Modified
2024-09-03 14:10
Summary
RADIUS Protocol Spoofing Vulnerability (Blast-RADIUS): July 2024
Notes
Summary
On July 7, 2024, security researchers disclosed the following vulnerability in the RADIUS protocol:
CVE-2024-3596: RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by an on-path attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
This vulnerability may impact any RADIUS client and server. For a description of this vulnerability, see VU#456537: RADIUS protocol susceptible to forgery attacks ["https://www.kb.cert.org/vuls/id/456537"].
Affected Products
Cisco investigated its product line to determine which products and cloud services may be affected by this vulnerability.
The Vulnerable Products section includes Cisco bug IDs for each affected product or service. The bugs are accessible through the Cisco Bug Search Tool and contain additional platform-specific information, including workarounds (if available) and fixed software releases.
Vulnerable Products
The following table lists Cisco products that are affected by the vulnerability that is described in this advisory. Customers should refer to the associated Cisco bug(s) for further details.
Product Cisco Bug ID Endpoint Clients and Client Software Duo Authentication Proxy CSCwk87884 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk87884"] Network and Content Security Devices Adaptive Security Appliance (ASA) CSCwk71992 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71992"] Firepower Device Manager (FDM) CSCwk69454 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk69454"] Firepower Management Center (FMC) Software CSCwk71817 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71817"] Firepower Threat Defense (FTD) Software CSCwk67902 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67902"] Meraki MX Series Notes ["https://documentation.meraki.com/General_Administration/Privacy_and_Security/RADIUS_Protocol_Spoofing_Vulnerability_(Blast-RADIUS)%3A_July_2024"] Identity Services Engine (ISE) CSCwk67747 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67747"] Secure Email Gateway CSCwk70832 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70832"] Secure Email and Web Manager CSCwk70833 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70833"] Secure Firewall CSCwk67859 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67859"] Secure Network Analytics CSCwk73619 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk73619"] Secure Web Appliance CSCwk70834 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70834"] Network Management and Provisioning Application Policy Infrastructure Controller (APIC) CSCwk70836 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70836"] Crosswork Network Controller CSCwk70850 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70850"] Nexus Dashboard, formerly Application Services Engine CSCwk70840 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70840"] Prime Infrastructure CSCwk79727 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79727"] Routing and Switching - Enterprise and Service Provider ASR 5000 Series Routers CSCwk70831 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831"] Catalyst Center CSCwk70845 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70845"] Catalyst SD-WAN Controller, formerly SD-WAN vSmart CSCwk70854 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854"] Catalyst SD-WAN Manager, formerly SD-WAN vManage CSCwk70854 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854"] Catalyst SD-WAN Validator, formerly SD-WAN vBond CSCwk70854 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854"] GGSN Gateway GPRS Support Node CSCwk70831 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831"] IOS Software CSCwk78278 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk78278"] IOS XE Software CSCwk70852 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70852"] IOS XR Software CSCwk70236 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70236"] IOx Fog Director CSCwk70851 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70851"] MDS 9000 Series Multilayer Switches CSCwk70837 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70837"] Network Convergence System (NCS) 2000 Series CSCwm33240 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwm33240"] Nexus 1000V Series Switches CSCwk79691 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79691"] Nexus 3000 Series Switches CSCwk70839 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70839"] Nexus 5500 Platform Switches CSCwk79692 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79692"] Nexus 5600 Platform Switches CSCwk79692 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79692"] Nexus 6000 Series Switches CSCwk79692 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79692"] Nexus 7000 Series Switches CSCwk70838 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70838"] Nexus 9000 Series Fabric Switches in ACI Mode CSCwk83051 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk83051"] Nexus 9000 Series Switches in standalone NX-OS mode CSCwk70839 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70839"] PGW Packet Data Network Gateway CSCwk70831 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831"] SD-WAN vEdge Routers CSCwk70854 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854"] System Architecture Evolution (SAE) Gateway CSCwk70831 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831"] Ultra Packet Core CSCwk70831 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831"] Unified Computing Enterprise NFV Infrastructure Software (NFVIS) CSCwk79647 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79647"] UCS Central Software CSCwk71967 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71967"] UCS Manager CSCwk70842 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70842"] WirelessUnified Computing AireOS Wireless LAN Controllers CSCwk70846 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70846"]
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products ["#vp"] section of this advisory are known to be affected by this vulnerability.
Cisco has confirmed that this vulnerability does not affect the following Cisco products:
Network Application, Service, and Acceleration
Nexus Dashboard Insights (On Prem)
Secure Workload
Network and Content Security Devices
Firepower 4100/9300 FXOS Firepower Chassis Manager
Secure Malware Analytics Appliance
Umbrella Active Directory (AD) Connector
Network Management and Provisioning
Cisco Evolved Programmable Network Manager (EPNM)
DNA Spaces Connector
Policy Suite
ThousandEyes Enterprise Agent
Routing and Switching - Enterprise and Service Provider
Ultra Cloud Core - Policy Control Function
Unified Computing
UCS B-Series Blade Servers
Wireless
6300 Series Embedded Services Access Points
Aironet 1540 Series
Aironet 1560 Series
Aironet 1810 Series OfficeExtend Access Points
Aironet 1810w Series Access Points
Aironet 1815 Series Access Points
Aironet 1830 Series Access Points
Aironet 1850 Series Access Points
Aironet 2800 Series Access Points
Aironet 3800 Series Access Points
Aironet 4800 Access Points
Aironet 802.11ac Wave2 Access Points
Catalyst 9100 Series Access Points
Catalyst IW6300 Heavy Duty Series Access Points
Catalyst IW9165 Heavy Duty Series
Catalyst IW9165 Rugged Series
Catalyst IW9167 Heavy Duty Series
Workarounds
There are no workarounds that address this vulnerability.
RADIUS clients and servers configured to use DTLS or TLS over TCP are not exploitable, even if the underlying implementation is otherwise vulnerable, as long as the traffic is not sent in plaintext.
Customers should determine the applicability and effectiveness of this mitigation in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.
Fixed Software
For information about fixed software releases ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"], consult the Cisco bugs identified in the Vulnerable Products ["#vp"] section of this advisory.
When considering software upgrades ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories ["https://www.cisco.com/go/psirt"] page, to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.
Vulnerability Policy
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy ["http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
Exploitation and Public Announcements
The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerability described in this advisory.
The Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory.
Source
This vulnerability was publicly disclosed by Sharon Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl on July 9, 2024.
Legal Disclaimer
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.
{ "document": { "acknowledgments": [ { "summary": "This vulnerability was publicly disclosed by Sharon Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl on July 9, 2024." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "On July 7, 2024, security researchers disclosed the following vulnerability in the RADIUS protocol:\r\n\r\nCVE-2024-3596: RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by an on-path attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.\r\nThis vulnerability may impact any RADIUS client and server. For a description of this vulnerability, see VU#456537: RADIUS protocol susceptible to forgery attacks [\"https://www.kb.cert.org/vuls/id/456537\"].\r\n\r\n", "title": "Summary" }, { "category": "general", "text": "Cisco investigated its product line to determine which products and cloud services may be affected by this vulnerability.\r\n\r\nThe Vulnerable Products section includes Cisco bug IDs for each affected product or service. The bugs are accessible through the Cisco Bug Search Tool and contain additional platform-specific information, including workarounds (if available) and fixed software releases.", "title": "Affected Products" }, { "category": "general", "text": "The following table lists Cisco products that are affected by the vulnerability that is described in this advisory. Customers should refer to the associated Cisco bug(s) for further details.\r\n Product Cisco Bug ID Endpoint Clients and Client Software Duo Authentication Proxy CSCwk87884 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk87884\"] Network and Content Security Devices Adaptive Security Appliance (ASA) CSCwk71992 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71992\"] Firepower Device Manager (FDM) CSCwk69454 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk69454\"] Firepower Management Center (FMC) Software CSCwk71817 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71817\"] Firepower Threat Defense (FTD) Software CSCwk67902 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67902\"] Meraki MX Series Notes [\"https://documentation.meraki.com/General_Administration/Privacy_and_Security/RADIUS_Protocol_Spoofing_Vulnerability_(Blast-RADIUS)%3A_July_2024\"] Identity Services Engine (ISE) CSCwk67747 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67747\"] Secure Email Gateway CSCwk70832 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70832\"] Secure Email and Web Manager CSCwk70833 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70833\"] Secure Firewall CSCwk67859 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67859\"] Secure Network Analytics CSCwk73619 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk73619\"] Secure Web Appliance CSCwk70834 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70834\"] Network Management and Provisioning Application Policy Infrastructure Controller (APIC) CSCwk70836 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70836\"] Crosswork Network Controller CSCwk70850 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70850\"] Nexus Dashboard, formerly Application Services Engine CSCwk70840 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70840\"] Prime Infrastructure CSCwk79727 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79727\"] Routing and Switching - Enterprise and Service Provider ASR 5000 Series Routers CSCwk70831 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831\"] Catalyst Center CSCwk70845 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70845\"] Catalyst SD-WAN Controller, formerly SD-WAN vSmart CSCwk70854 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854\"] Catalyst SD-WAN Manager, formerly SD-WAN vManage CSCwk70854 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854\"] Catalyst SD-WAN Validator, formerly SD-WAN vBond CSCwk70854 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854\"] GGSN Gateway GPRS Support Node CSCwk70831 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831\"] IOS Software CSCwk78278 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk78278\"] IOS XE Software CSCwk70852 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70852\"] IOS XR Software CSCwk70236 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70236\"] IOx Fog Director CSCwk70851 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70851\"] MDS 9000 Series Multilayer Switches CSCwk70837 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70837\"] Network Convergence System (NCS) 2000 Series CSCwm33240 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwm33240\"] Nexus 1000V Series Switches CSCwk79691 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79691\"] Nexus 3000 Series Switches CSCwk70839 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70839\"] Nexus 5500 Platform Switches CSCwk79692 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79692\"] Nexus 5600 Platform Switches CSCwk79692 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79692\"] Nexus 6000 Series Switches CSCwk79692 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79692\"] Nexus 7000 Series Switches CSCwk70838 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70838\"] Nexus 9000 Series Fabric Switches in ACI Mode CSCwk83051 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk83051\"] Nexus 9000 Series Switches in standalone NX-OS mode CSCwk70839 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70839\"] PGW Packet Data Network Gateway CSCwk70831 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831\"] SD-WAN vEdge Routers CSCwk70854 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854\"] System Architecture Evolution (SAE) Gateway CSCwk70831 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831\"] Ultra Packet Core CSCwk70831 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831\"] Unified Computing Enterprise NFV Infrastructure Software (NFVIS) CSCwk79647 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79647\"] UCS Central Software CSCwk71967 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71967\"] UCS Manager CSCwk70842 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70842\"] WirelessUnified Computing AireOS Wireless LAN Controllers CSCwk70846 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70846\"]", "title": "Vulnerable Products" }, { "category": "general", "text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.\r\n\r\nCisco has confirmed that this vulnerability does not affect the following Cisco products:\r\n\r\nNetwork Application, Service, and Acceleration\r\n\r\nNexus Dashboard Insights (On Prem)\r\nSecure Workload\r\n\r\nNetwork and Content Security Devices\r\n\r\nFirepower 4100/9300 FXOS Firepower Chassis Manager\r\nSecure Malware Analytics Appliance\r\nUmbrella Active Directory (AD) Connector\r\n\r\nNetwork Management and Provisioning\r\n\r\nCisco Evolved Programmable Network Manager (EPNM)\r\nDNA Spaces Connector\r\nPolicy Suite\r\nThousandEyes Enterprise Agent\r\n\r\nRouting and Switching - Enterprise and Service Provider\r\n\r\nUltra Cloud Core - Policy Control Function\r\n\r\nUnified Computing\r\n\r\nUCS B-Series Blade Servers\r\n\r\nWireless\r\n\r\n6300 Series Embedded Services Access Points\r\nAironet 1540 Series\r\nAironet 1560 Series\r\nAironet 1810 Series OfficeExtend Access Points\r\nAironet 1810w Series Access Points\r\nAironet 1815 Series Access Points\r\nAironet 1830 Series Access Points\r\nAironet 1850 Series Access Points\r\nAironet 2800 Series Access Points\r\nAironet 3800 Series Access Points\r\nAironet 4800 Access Points\r\nAironet 802.11ac Wave2 Access Points\r\nCatalyst 9100 Series Access Points\r\nCatalyst IW6300 Heavy Duty Series Access Points\r\nCatalyst IW9165 Heavy Duty Series\r\nCatalyst IW9165 Rugged Series\r\nCatalyst IW9167 Heavy Duty Series", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "There are no workarounds that address this vulnerability.\r\n\r\nRADIUS clients and servers configured to use DTLS or TLS over TCP are not exploitable, even if the underlying implementation is otherwise vulnerable, as long as the traffic is not sent in plaintext.\r\n\r\nCustomers should determine the applicability and effectiveness of this mitigation in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.", "title": "Workarounds" }, { "category": "general", "text": "For information about fixed software releases [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], consult the Cisco bugs identified in the Vulnerable Products [\"#vp\"] section of this advisory.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories [\"https://www.cisco.com/go/psirt\"] page, to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.", "title": "Fixed Software" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerability described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory.", "title": "Exploitation and Public Announcements" }, { "category": "general", "text": "This vulnerability was publicly disclosed by Sharon Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl on July 9, 2024.", "title": "Source" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "psirt@cisco.com", "issuing_authority": "Cisco PSIRT", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "RADIUS Protocol Spoofing Vulnerability (Blast-RADIUS): July 2024", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-radius-spoofing-july-2024-87cCDwZ3" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "VU#456537: RADIUS protocol susceptible to forgery attacks", "url": "https://www.kb.cert.org/vuls/id/456537" }, { "category": "external", "summary": "CSCwk87884", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk87884" }, { "category": "external", "summary": "CSCwk71992", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71992" }, { "category": "external", "summary": "CSCwk69454", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk69454" }, { "category": "external", "summary": "CSCwk71817", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71817" }, { "category": "external", "summary": "CSCwk67902", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67902" }, { "category": "external", "summary": "Notes", "url": "https://documentation.meraki.com/General_Administration/Privacy_and_Security/RADIUS_Protocol_Spoofing_Vulnerability_(Blast-RADIUS)%3A_July_2024" }, { "category": "external", "summary": "CSCwk67747", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67747" }, { "category": "external", "summary": "CSCwk70832", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70832" }, { "category": "external", "summary": "CSCwk70833", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70833" }, { "category": "external", "summary": "CSCwk67859", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67859" }, { "category": "external", "summary": "CSCwk73619", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk73619" }, { "category": "external", "summary": "CSCwk70834", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70834" }, { "category": "external", "summary": "CSCwk70836", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70836" }, { "category": "external", "summary": "CSCwk70850", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70850" }, { "category": "external", "summary": "CSCwk70840", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70840" }, { "category": "external", "summary": "CSCwk79727", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79727" }, { "category": "external", "summary": "CSCwk70831", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831" }, { "category": "external", "summary": "CSCwk70845", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70845" }, { "category": "external", "summary": "CSCwk70854", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854" }, { "category": "external", "summary": "CSCwk78278", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk78278" }, { "category": "external", "summary": "CSCwk70852", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70852" }, { "category": "external", "summary": "CSCwk70236", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70236" }, { "category": "external", "summary": "CSCwk70851", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70851" }, { "category": "external", "summary": "CSCwk70837", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70837" }, { "category": "external", "summary": "CSCwm33240", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwm33240" }, { "category": "external", "summary": "CSCwk79691", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79691" }, { "category": "external", "summary": "CSCwk70839", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70839" }, { "category": "external", "summary": "CSCwk79692", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79692" }, { "category": "external", "summary": "CSCwk70838", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70838" }, { "category": "external", "summary": "CSCwk83051", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk83051" }, { "category": "external", "summary": "CSCwk79647", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79647" }, { "category": "external", "summary": "CSCwk71967", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71967" }, { "category": "external", "summary": "CSCwk70842", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70842" }, { "category": "external", "summary": "CSCwk70846", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70846" }, { "category": "external", "summary": "fixed software releases", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "Cisco Security Advisories", "url": "https://www.cisco.com/go/psirt" }, { "category": "external", "summary": "Security Vulnerability Policy", "url": "http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html" } ], "title": "RADIUS Protocol Spoofing Vulnerability (Blast-RADIUS): July 2024", "tracking": { "current_release_date": "2024-09-03T14:10:25+00:00", "generator": { "date": "2024-09-03T14:10:28+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-radius-spoofing-july-2024-87cCDwZ3", "initial_release_date": "2024-07-10T16:00:00+00:00", "revision_history": [ { "date": "2024-07-10T21:54:27+00:00", "number": "1.0.0", "summary": "Initial public release." }, { "date": "2024-07-11T21:24:06+00:00", "number": "1.1.0", "summary": "Updated the list of products currently under investigation." }, { "date": "2024-07-16T21:57:30+00:00", "number": "1.2.0", "summary": "Updated lists of products currently under investigation, products determined to be affected, and products determined to be not vulnerable." }, { "date": "2024-07-17T21:37:05+00:00", "number": "1.3.0", "summary": "Updated lists of products currently under investigation, products determined to be affected, and products determined to be not vulnerable." }, { "date": "2024-07-19T20:54:21+00:00", "number": "1.4.0", "summary": "Updated lists of products currently under investigation, products determined to be affected, and products determined to be not vulnerable." }, { "date": "2024-07-24T19:33:11+00:00", "number": "1.5.0", "summary": "Updated lists of products currently under investigation, products determined to be affected, and products determined to be not vulnerable." }, { "date": "2024-07-29T20:06:24+00:00", "number": "1.6.0", "summary": "Updated lists of products currently under investigation and products determined to be affected." }, { "date": "2024-08-02T18:48:25+00:00", "number": "1.7.0", "summary": "Updated summary, lists of products currently under investigation, and products determined to be affected." }, { "date": "2024-08-09T19:53:46+00:00", "number": "1.8.0", "summary": "Updated lists of products considered vulnerable and products considered not vulnerable." }, { "date": "2024-08-19T17:00:13+00:00", "number": "1.9.0", "summary": "Updated the list of products confirmed not vulnerable." }, { "date": "2024-09-03T14:10:25+00:00", "number": "1.10.0", "summary": "Added Network Convergence System 2000 Series to the list of vulnerable products." } ], "status": "final", "version": "1.10.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_family", "name": "Cisco Adaptive Security Appliance (ASA) Software", "product": { "name": "Cisco Adaptive Security Appliance (ASA) Software ", "product_id": "CSAFPID-6588" } } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-6588" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-6588" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-6588" ] } ], "title": "RADIUS Vulnerability Affecting Cisco Products: July 2024" } ] }
cisco-sa-radius-spoofing-july-2024-87cCDwZ3
Vulnerability from csaf_cisco
Published
2024-07-10 16:00
Modified
2024-09-03 14:10
Summary
RADIUS Protocol Spoofing Vulnerability (Blast-RADIUS): July 2024
Notes
Summary
On July 7, 2024, security researchers disclosed the following vulnerability in the RADIUS protocol:
CVE-2024-3596: RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by an on-path attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
This vulnerability may impact any RADIUS client and server. For a description of this vulnerability, see VU#456537: RADIUS protocol susceptible to forgery attacks ["https://www.kb.cert.org/vuls/id/456537"].
Affected Products
Cisco investigated its product line to determine which products and cloud services may be affected by this vulnerability.
The Vulnerable Products section includes Cisco bug IDs for each affected product or service. The bugs are accessible through the Cisco Bug Search Tool and contain additional platform-specific information, including workarounds (if available) and fixed software releases.
Vulnerable Products
The following table lists Cisco products that are affected by the vulnerability that is described in this advisory. Customers should refer to the associated Cisco bug(s) for further details.
Product Cisco Bug ID Endpoint Clients and Client Software Duo Authentication Proxy CSCwk87884 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk87884"] Network and Content Security Devices Adaptive Security Appliance (ASA) CSCwk71992 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71992"] Firepower Device Manager (FDM) CSCwk69454 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk69454"] Firepower Management Center (FMC) Software CSCwk71817 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71817"] Firepower Threat Defense (FTD) Software CSCwk67902 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67902"] Meraki MX Series Notes ["https://documentation.meraki.com/General_Administration/Privacy_and_Security/RADIUS_Protocol_Spoofing_Vulnerability_(Blast-RADIUS)%3A_July_2024"] Identity Services Engine (ISE) CSCwk67747 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67747"] Secure Email Gateway CSCwk70832 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70832"] Secure Email and Web Manager CSCwk70833 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70833"] Secure Firewall CSCwk67859 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67859"] Secure Network Analytics CSCwk73619 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk73619"] Secure Web Appliance CSCwk70834 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70834"] Network Management and Provisioning Application Policy Infrastructure Controller (APIC) CSCwk70836 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70836"] Crosswork Network Controller CSCwk70850 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70850"] Nexus Dashboard, formerly Application Services Engine CSCwk70840 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70840"] Prime Infrastructure CSCwk79727 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79727"] Routing and Switching - Enterprise and Service Provider ASR 5000 Series Routers CSCwk70831 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831"] Catalyst Center CSCwk70845 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70845"] Catalyst SD-WAN Controller, formerly SD-WAN vSmart CSCwk70854 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854"] Catalyst SD-WAN Manager, formerly SD-WAN vManage CSCwk70854 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854"] Catalyst SD-WAN Validator, formerly SD-WAN vBond CSCwk70854 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854"] GGSN Gateway GPRS Support Node CSCwk70831 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831"] IOS Software CSCwk78278 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk78278"] IOS XE Software CSCwk70852 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70852"] IOS XR Software CSCwk70236 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70236"] IOx Fog Director CSCwk70851 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70851"] MDS 9000 Series Multilayer Switches CSCwk70837 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70837"] Network Convergence System (NCS) 2000 Series CSCwm33240 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwm33240"] Nexus 1000V Series Switches CSCwk79691 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79691"] Nexus 3000 Series Switches CSCwk70839 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70839"] Nexus 5500 Platform Switches CSCwk79692 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79692"] Nexus 5600 Platform Switches CSCwk79692 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79692"] Nexus 6000 Series Switches CSCwk79692 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79692"] Nexus 7000 Series Switches CSCwk70838 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70838"] Nexus 9000 Series Fabric Switches in ACI Mode CSCwk83051 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk83051"] Nexus 9000 Series Switches in standalone NX-OS mode CSCwk70839 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70839"] PGW Packet Data Network Gateway CSCwk70831 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831"] SD-WAN vEdge Routers CSCwk70854 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854"] System Architecture Evolution (SAE) Gateway CSCwk70831 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831"] Ultra Packet Core CSCwk70831 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831"] Unified Computing Enterprise NFV Infrastructure Software (NFVIS) CSCwk79647 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79647"] UCS Central Software CSCwk71967 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71967"] UCS Manager CSCwk70842 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70842"] WirelessUnified Computing AireOS Wireless LAN Controllers CSCwk70846 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70846"]
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products ["#vp"] section of this advisory are known to be affected by this vulnerability.
Cisco has confirmed that this vulnerability does not affect the following Cisco products:
Network Application, Service, and Acceleration
Nexus Dashboard Insights (On Prem)
Secure Workload
Network and Content Security Devices
Firepower 4100/9300 FXOS Firepower Chassis Manager
Secure Malware Analytics Appliance
Umbrella Active Directory (AD) Connector
Network Management and Provisioning
Cisco Evolved Programmable Network Manager (EPNM)
DNA Spaces Connector
Policy Suite
ThousandEyes Enterprise Agent
Routing and Switching - Enterprise and Service Provider
Ultra Cloud Core - Policy Control Function
Unified Computing
UCS B-Series Blade Servers
Wireless
6300 Series Embedded Services Access Points
Aironet 1540 Series
Aironet 1560 Series
Aironet 1810 Series OfficeExtend Access Points
Aironet 1810w Series Access Points
Aironet 1815 Series Access Points
Aironet 1830 Series Access Points
Aironet 1850 Series Access Points
Aironet 2800 Series Access Points
Aironet 3800 Series Access Points
Aironet 4800 Access Points
Aironet 802.11ac Wave2 Access Points
Catalyst 9100 Series Access Points
Catalyst IW6300 Heavy Duty Series Access Points
Catalyst IW9165 Heavy Duty Series
Catalyst IW9165 Rugged Series
Catalyst IW9167 Heavy Duty Series
Workarounds
There are no workarounds that address this vulnerability.
RADIUS clients and servers configured to use DTLS or TLS over TCP are not exploitable, even if the underlying implementation is otherwise vulnerable, as long as the traffic is not sent in plaintext.
Customers should determine the applicability and effectiveness of this mitigation in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.
Fixed Software
For information about fixed software releases ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"], consult the Cisco bugs identified in the Vulnerable Products ["#vp"] section of this advisory.
When considering software upgrades ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories ["https://www.cisco.com/go/psirt"] page, to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.
Vulnerability Policy
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy ["http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
Exploitation and Public Announcements
The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerability described in this advisory.
The Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory.
Source
This vulnerability was publicly disclosed by Sharon Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl on July 9, 2024.
Legal Disclaimer
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.
{ "document": { "acknowledgments": [ { "summary": "This vulnerability was publicly disclosed by Sharon Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl on July 9, 2024." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "On July 7, 2024, security researchers disclosed the following vulnerability in the RADIUS protocol:\r\n\r\nCVE-2024-3596: RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by an on-path attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.\r\nThis vulnerability may impact any RADIUS client and server. For a description of this vulnerability, see VU#456537: RADIUS protocol susceptible to forgery attacks [\"https://www.kb.cert.org/vuls/id/456537\"].\r\n\r\n", "title": "Summary" }, { "category": "general", "text": "Cisco investigated its product line to determine which products and cloud services may be affected by this vulnerability.\r\n\r\nThe Vulnerable Products section includes Cisco bug IDs for each affected product or service. The bugs are accessible through the Cisco Bug Search Tool and contain additional platform-specific information, including workarounds (if available) and fixed software releases.", "title": "Affected Products" }, { "category": "general", "text": "The following table lists Cisco products that are affected by the vulnerability that is described in this advisory. Customers should refer to the associated Cisco bug(s) for further details.\r\n Product Cisco Bug ID Endpoint Clients and Client Software Duo Authentication Proxy CSCwk87884 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk87884\"] Network and Content Security Devices Adaptive Security Appliance (ASA) CSCwk71992 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71992\"] Firepower Device Manager (FDM) CSCwk69454 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk69454\"] Firepower Management Center (FMC) Software CSCwk71817 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71817\"] Firepower Threat Defense (FTD) Software CSCwk67902 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67902\"] Meraki MX Series Notes [\"https://documentation.meraki.com/General_Administration/Privacy_and_Security/RADIUS_Protocol_Spoofing_Vulnerability_(Blast-RADIUS)%3A_July_2024\"] Identity Services Engine (ISE) CSCwk67747 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67747\"] Secure Email Gateway CSCwk70832 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70832\"] Secure Email and Web Manager CSCwk70833 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70833\"] Secure Firewall CSCwk67859 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67859\"] Secure Network Analytics CSCwk73619 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk73619\"] Secure Web Appliance CSCwk70834 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70834\"] Network Management and Provisioning Application Policy Infrastructure Controller (APIC) CSCwk70836 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70836\"] Crosswork Network Controller CSCwk70850 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70850\"] Nexus Dashboard, formerly Application Services Engine CSCwk70840 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70840\"] Prime Infrastructure CSCwk79727 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79727\"] Routing and Switching - Enterprise and Service Provider ASR 5000 Series Routers CSCwk70831 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831\"] Catalyst Center CSCwk70845 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70845\"] Catalyst SD-WAN Controller, formerly SD-WAN vSmart CSCwk70854 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854\"] Catalyst SD-WAN Manager, formerly SD-WAN vManage CSCwk70854 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854\"] Catalyst SD-WAN Validator, formerly SD-WAN vBond CSCwk70854 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854\"] GGSN Gateway GPRS Support Node CSCwk70831 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831\"] IOS Software CSCwk78278 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk78278\"] IOS XE Software CSCwk70852 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70852\"] IOS XR Software CSCwk70236 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70236\"] IOx Fog Director CSCwk70851 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70851\"] MDS 9000 Series Multilayer Switches CSCwk70837 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70837\"] Network Convergence System (NCS) 2000 Series CSCwm33240 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwm33240\"] Nexus 1000V Series Switches CSCwk79691 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79691\"] Nexus 3000 Series Switches CSCwk70839 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70839\"] Nexus 5500 Platform Switches CSCwk79692 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79692\"] Nexus 5600 Platform Switches CSCwk79692 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79692\"] Nexus 6000 Series Switches CSCwk79692 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79692\"] Nexus 7000 Series Switches CSCwk70838 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70838\"] Nexus 9000 Series Fabric Switches in ACI Mode CSCwk83051 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk83051\"] Nexus 9000 Series Switches in standalone NX-OS mode CSCwk70839 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70839\"] PGW Packet Data Network Gateway CSCwk70831 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831\"] SD-WAN vEdge Routers CSCwk70854 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854\"] System Architecture Evolution (SAE) Gateway CSCwk70831 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831\"] Ultra Packet Core CSCwk70831 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831\"] Unified Computing Enterprise NFV Infrastructure Software (NFVIS) CSCwk79647 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79647\"] UCS Central Software CSCwk71967 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71967\"] UCS Manager CSCwk70842 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70842\"] WirelessUnified Computing AireOS Wireless LAN Controllers CSCwk70846 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70846\"]", "title": "Vulnerable Products" }, { "category": "general", "text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.\r\n\r\nCisco has confirmed that this vulnerability does not affect the following Cisco products:\r\n\r\nNetwork Application, Service, and Acceleration\r\n\r\nNexus Dashboard Insights (On Prem)\r\nSecure Workload\r\n\r\nNetwork and Content Security Devices\r\n\r\nFirepower 4100/9300 FXOS Firepower Chassis Manager\r\nSecure Malware Analytics Appliance\r\nUmbrella Active Directory (AD) Connector\r\n\r\nNetwork Management and Provisioning\r\n\r\nCisco Evolved Programmable Network Manager (EPNM)\r\nDNA Spaces Connector\r\nPolicy Suite\r\nThousandEyes Enterprise Agent\r\n\r\nRouting and Switching - Enterprise and Service Provider\r\n\r\nUltra Cloud Core - Policy Control Function\r\n\r\nUnified Computing\r\n\r\nUCS B-Series Blade Servers\r\n\r\nWireless\r\n\r\n6300 Series Embedded Services Access Points\r\nAironet 1540 Series\r\nAironet 1560 Series\r\nAironet 1810 Series OfficeExtend Access Points\r\nAironet 1810w Series Access Points\r\nAironet 1815 Series Access Points\r\nAironet 1830 Series Access Points\r\nAironet 1850 Series Access Points\r\nAironet 2800 Series Access Points\r\nAironet 3800 Series Access Points\r\nAironet 4800 Access Points\r\nAironet 802.11ac Wave2 Access Points\r\nCatalyst 9100 Series Access Points\r\nCatalyst IW6300 Heavy Duty Series Access Points\r\nCatalyst IW9165 Heavy Duty Series\r\nCatalyst IW9165 Rugged Series\r\nCatalyst IW9167 Heavy Duty Series", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "There are no workarounds that address this vulnerability.\r\n\r\nRADIUS clients and servers configured to use DTLS or TLS over TCP are not exploitable, even if the underlying implementation is otherwise vulnerable, as long as the traffic is not sent in plaintext.\r\n\r\nCustomers should determine the applicability and effectiveness of this mitigation in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.", "title": "Workarounds" }, { "category": "general", "text": "For information about fixed software releases [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], consult the Cisco bugs identified in the Vulnerable Products [\"#vp\"] section of this advisory.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories [\"https://www.cisco.com/go/psirt\"] page, to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.", "title": "Fixed Software" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerability described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory.", "title": "Exploitation and Public Announcements" }, { "category": "general", "text": "This vulnerability was publicly disclosed by Sharon Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens, and Adam Suhl on July 9, 2024.", "title": "Source" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "psirt@cisco.com", "issuing_authority": "Cisco PSIRT", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "RADIUS Protocol Spoofing Vulnerability (Blast-RADIUS): July 2024", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-radius-spoofing-july-2024-87cCDwZ3" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "VU#456537: RADIUS protocol susceptible to forgery attacks", "url": "https://www.kb.cert.org/vuls/id/456537" }, { "category": "external", "summary": "CSCwk87884", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk87884" }, { "category": "external", "summary": "CSCwk71992", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71992" }, { "category": "external", "summary": "CSCwk69454", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk69454" }, { "category": "external", "summary": "CSCwk71817", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71817" }, { "category": "external", "summary": "CSCwk67902", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67902" }, { "category": "external", "summary": "Notes", "url": "https://documentation.meraki.com/General_Administration/Privacy_and_Security/RADIUS_Protocol_Spoofing_Vulnerability_(Blast-RADIUS)%3A_July_2024" }, { "category": "external", "summary": "CSCwk67747", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67747" }, { "category": "external", "summary": "CSCwk70832", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70832" }, { "category": "external", "summary": "CSCwk70833", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70833" }, { "category": "external", "summary": "CSCwk67859", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk67859" }, { "category": "external", "summary": "CSCwk73619", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk73619" }, { "category": "external", "summary": "CSCwk70834", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70834" }, { "category": "external", "summary": "CSCwk70836", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70836" }, { "category": "external", "summary": "CSCwk70850", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70850" }, { "category": "external", "summary": "CSCwk70840", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70840" }, { "category": "external", "summary": "CSCwk79727", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79727" }, { "category": "external", "summary": "CSCwk70831", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70831" }, { "category": "external", "summary": "CSCwk70845", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70845" }, { "category": "external", "summary": "CSCwk70854", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70854" }, { "category": "external", "summary": "CSCwk78278", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk78278" }, { "category": "external", "summary": "CSCwk70852", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70852" }, { "category": "external", "summary": "CSCwk70236", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70236" }, { "category": "external", "summary": "CSCwk70851", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70851" }, { "category": "external", "summary": "CSCwk70837", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70837" }, { "category": "external", "summary": "CSCwm33240", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwm33240" }, { "category": "external", "summary": "CSCwk79691", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79691" }, { "category": "external", "summary": "CSCwk70839", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70839" }, { "category": "external", "summary": "CSCwk79692", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79692" }, { "category": "external", "summary": "CSCwk70838", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70838" }, { "category": "external", "summary": "CSCwk83051", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk83051" }, { "category": "external", "summary": "CSCwk79647", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk79647" }, { "category": "external", "summary": "CSCwk71967", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk71967" }, { "category": "external", "summary": "CSCwk70842", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70842" }, { "category": "external", "summary": "CSCwk70846", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk70846" }, { "category": "external", "summary": "fixed software releases", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "Cisco Security Advisories", "url": "https://www.cisco.com/go/psirt" }, { "category": "external", "summary": "Security Vulnerability Policy", "url": "http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html" } ], "title": "RADIUS Protocol Spoofing Vulnerability (Blast-RADIUS): July 2024", "tracking": { "current_release_date": "2024-09-03T14:10:25+00:00", "generator": { "date": "2024-09-03T14:10:28+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-radius-spoofing-july-2024-87cCDwZ3", "initial_release_date": "2024-07-10T16:00:00+00:00", "revision_history": [ { "date": "2024-07-10T21:54:27+00:00", "number": "1.0.0", "summary": "Initial public release." }, { "date": "2024-07-11T21:24:06+00:00", "number": "1.1.0", "summary": "Updated the list of products currently under investigation." }, { "date": "2024-07-16T21:57:30+00:00", "number": "1.2.0", "summary": "Updated lists of products currently under investigation, products determined to be affected, and products determined to be not vulnerable." }, { "date": "2024-07-17T21:37:05+00:00", "number": "1.3.0", "summary": "Updated lists of products currently under investigation, products determined to be affected, and products determined to be not vulnerable." }, { "date": "2024-07-19T20:54:21+00:00", "number": "1.4.0", "summary": "Updated lists of products currently under investigation, products determined to be affected, and products determined to be not vulnerable." }, { "date": "2024-07-24T19:33:11+00:00", "number": "1.5.0", "summary": "Updated lists of products currently under investigation, products determined to be affected, and products determined to be not vulnerable." }, { "date": "2024-07-29T20:06:24+00:00", "number": "1.6.0", "summary": "Updated lists of products currently under investigation and products determined to be affected." }, { "date": "2024-08-02T18:48:25+00:00", "number": "1.7.0", "summary": "Updated summary, lists of products currently under investigation, and products determined to be affected." }, { "date": "2024-08-09T19:53:46+00:00", "number": "1.8.0", "summary": "Updated lists of products considered vulnerable and products considered not vulnerable." }, { "date": "2024-08-19T17:00:13+00:00", "number": "1.9.0", "summary": "Updated the list of products confirmed not vulnerable." }, { "date": "2024-09-03T14:10:25+00:00", "number": "1.10.0", "summary": "Added Network Convergence System 2000 Series to the list of vulnerable products." } ], "status": "final", "version": "1.10.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_family", "name": "Cisco Adaptive Security Appliance (ASA) Software", "product": { "name": "Cisco Adaptive Security Appliance (ASA) Software ", "product_id": "CSAFPID-6588" } } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-6588" ] }, "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-6588" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-6588" ] } ], "title": "RADIUS Vulnerability Affecting Cisco Products: July 2024" } ] }
ICSA-24-193-05
Vulnerability from csaf_cisa
Published
2024-07-09 00:00
Modified
2024-11-12 00:00
Summary
Siemens SCALANCE, RUGGEDCOM, SIPLUS, and SINEC
Notes
Summary
This advisory documents the impact of CVE-2024-3596 (also dubbed "Blastradius"), a vulnerability in the RADIUS protocol, to SCALANCE, RUGGEDCOM and related products.
The vulnerability could allow on-path attackers, located between a Network Access Server (the RADIUS client, e.g., SCALANCE or RUGGEDCOM devices) and a RADIUS server (e.g., SINEC INS), to forge Access-Request packets in a way that enables them to modify the corresponding server response packet at will, e.g., turning an "Access-Reject" message into an "Access-Accept". This would cause the Network Access Server to grant the attackers access to the network with the attackers desired authorization (and without the need of knowing or guessing legitimate access credentials).
Further details, the impact to SCALANCE, RUGGEDCOM and related products, specific countermeasures and external references can be found in the chapter "Additional Information".
Siemens has released a new version for RUGGEDCOM CROSSBOW and recommends to update to the latest version. Siemens is preparing further fix versions and recommends countermeasures for products where fixes are not, or not yet available.
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Advisory Conversion Disclaimer
This CISA CSAF advisory was converted from Siemens ProductCERT's CSAF advisory.
Critical infrastructure sectors
Multiple
Countries/areas deployed
Worldwide
Company headquarters location
Germany
Recommended Practices
CISA recommends users take defensive measures to minimize the exploitation risk of these vulnerabilities.
Recommended Practices
Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.
Recommended Practices
Locate control system networks and remote devices behind firewalls and isolate them from business networks.
Recommended Practices
When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.
Recommended Practices
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Recommended Practices
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Recommended Practices
Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting this vulnerability to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "This advisory documents the impact of CVE-2024-3596 (also dubbed \"Blastradius\"), a vulnerability in the RADIUS protocol, to SCALANCE, RUGGEDCOM and related products.\n\nThe vulnerability could allow on-path attackers, located between a Network Access Server (the RADIUS client, e.g., SCALANCE or RUGGEDCOM devices) and a RADIUS server (e.g., SINEC INS), to forge Access-Request packets in a way that enables them to modify the corresponding server response packet at will, e.g., turning an \"Access-Reject\" message into an \"Access-Accept\". This would cause the Network Access Server to grant the attackers access to the network with the attackers desired authorization (and without the need of knowing or guessing legitimate access credentials).\n\nFurther details, the impact to SCALANCE, RUGGEDCOM and related products, specific countermeasures and external references can be found in the chapter \"Additional Information\".\n\nSiemens has released a new version for RUGGEDCOM CROSSBOW and recommends to update to the latest version. Siemens is preparing further fix versions and recommends countermeasures for products where fixes are not, or not yet available.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of these vulnerabilities.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-723487: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-723487.json" }, { "category": "self", "summary": "SSA-723487: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-723487.html" }, { "category": "self", "summary": "ICS Advisory ICSA-24-193-05 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-193-05.json" }, { "category": "self", "summary": "ICS Advisory ICSA-24-193-05 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-193-05" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens SCALANCE, RUGGEDCOM, SIPLUS, and SINEC", "tracking": { "current_release_date": "2024-11-12T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-24-193-05", "initial_release_date": "2024-07-09T00:00:00.000000Z", "revision_history": [ { "date": "2024-07-09T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2024-07-22T00:00:00.000000Z", "legacy_version": "1.1", "number": "2", "summary": "Clarified that the fix for SCALANCE X-300 family (incl. X408 and SIPLUS NET variants) in V4.1.8 only covers RADIUS client mitigation C1, but not C2" }, { "date": "2024-11-12T00:00:00.000000Z", "legacy_version": "1.2", "number": "3", "summary": "Added fix for RUGGEDCOM CROSSBOW" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.6", "product": { "name": "RUGGEDCOM CROSSBOW", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "RUGGEDCOM CROSSBOW" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM i800", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "RUGGEDCOM i800" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM i800NC", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "RUGGEDCOM i800NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM i801", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "RUGGEDCOM i801" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM i801NC", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "RUGGEDCOM i801NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM i802", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "RUGGEDCOM i802" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM i802NC", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "RUGGEDCOM i802NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM i803", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "RUGGEDCOM i803" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM i803NC", "product_id": "CSAFPID-0009" } } ], "category": "product_name", "name": "RUGGEDCOM i803NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM M969", "product_id": "CSAFPID-0010" } } ], "category": "product_name", "name": "RUGGEDCOM M969" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM M969NC", "product_id": "CSAFPID-0011" } } ], "category": "product_name", "name": "RUGGEDCOM M969NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM M2100", "product_id": "CSAFPID-0012" } } ], "category": "product_name", "name": "RUGGEDCOM M2100" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM M2100NC", "product_id": "CSAFPID-0013" } } ], "category": "product_name", "name": "RUGGEDCOM M2100NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM M2200", "product_id": "CSAFPID-0014" } } ], "category": "product_name", "name": "RUGGEDCOM M2200" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM M2200NC", "product_id": "CSAFPID-0015" } } ], "category": "product_name", "name": "RUGGEDCOM M2200NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)", "product_id": "CSAFPID-0016", "product_identification_helper": { "model_numbers": [ "6GK6108-4AM00-2BA2" ] } } } ], "category": "product_name", "name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)", "product_id": "CSAFPID-0017", "product_identification_helper": { "model_numbers": [ "6GK6108-4AM00-2DA2" ] } } } ], "category": "product_name", "name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RMC30", "product_id": "CSAFPID-0018" } } ], "category": "product_name", "name": "RUGGEDCOM RMC30" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RMC30NC", "product_id": "CSAFPID-0019" } } ], "category": "product_name", "name": "RUGGEDCOM RMC30NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RMC8388 V4.X", "product_id": "CSAFPID-0020" } } ], "category": "product_name", "name": "RUGGEDCOM RMC8388 V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RMC8388 V5.X", "product_id": "CSAFPID-0021" } } ], "category": "product_name", "name": "RUGGEDCOM RMC8388 V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RMC8388NC V4.X", "product_id": "CSAFPID-0022" } } ], "category": "product_name", "name": "RUGGEDCOM RMC8388NC V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RMC8388NC V5.X", "product_id": "CSAFPID-0023" } } ], "category": "product_name", "name": "RUGGEDCOM RMC8388NC V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM ROX MX5000", "product_id": "CSAFPID-0024" } } ], "category": "product_name", "name": "RUGGEDCOM ROX MX5000" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM ROX MX5000RE", "product_id": "CSAFPID-0025" } } ], "category": "product_name", "name": "RUGGEDCOM ROX MX5000RE" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM ROX RX1400", "product_id": "CSAFPID-0026" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1400" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM ROX RX1500", "product_id": "CSAFPID-0027" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1500" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM ROX RX1501", "product_id": "CSAFPID-0028" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1501" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM ROX RX1510", "product_id": "CSAFPID-0029" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1510" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM ROX RX1511", "product_id": "CSAFPID-0030" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1511" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM ROX RX1512", "product_id": "CSAFPID-0031" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1512" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM ROX RX1524", "product_id": "CSAFPID-0032" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1524" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM ROX RX1536", "product_id": "CSAFPID-0033" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1536" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM ROX RX5000", "product_id": "CSAFPID-0034" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX5000" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RP110", "product_id": "CSAFPID-0035" } } ], "category": "product_name", "name": "RUGGEDCOM RP110" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RP110NC", "product_id": "CSAFPID-0036" } } ], "category": "product_name", "name": "RUGGEDCOM RP110NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS400", "product_id": "CSAFPID-0037" } } ], "category": "product_name", "name": "RUGGEDCOM RS400" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS400NC", "product_id": "CSAFPID-0038" } } ], "category": "product_name", "name": "RUGGEDCOM RS400NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS401", "product_id": "CSAFPID-0039" } } ], "category": "product_name", "name": "RUGGEDCOM RS401" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS401NC", "product_id": "CSAFPID-0040" } } ], "category": "product_name", "name": "RUGGEDCOM RS401NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS416", "product_id": "CSAFPID-0041" } } ], "category": "product_name", "name": "RUGGEDCOM RS416" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS416NC", "product_id": "CSAFPID-0042" } } ], "category": "product_name", "name": "RUGGEDCOM RS416NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS416NCv2 V4.X", "product_id": "CSAFPID-0043" } } ], "category": "product_name", "name": "RUGGEDCOM RS416NCv2 V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS416NCv2 V5.X", "product_id": "CSAFPID-0044" } } ], "category": "product_name", "name": "RUGGEDCOM RS416NCv2 V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS416P", "product_id": "CSAFPID-0045" } } ], "category": "product_name", "name": "RUGGEDCOM RS416P" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS416PNC", "product_id": "CSAFPID-0046" } } ], "category": "product_name", "name": "RUGGEDCOM RS416PNC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS416PNCv2 V4.X", "product_id": "CSAFPID-0047" } } ], "category": "product_name", "name": "RUGGEDCOM RS416PNCv2 V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS416PNCv2 V5.X", "product_id": "CSAFPID-0048" } } ], "category": "product_name", "name": "RUGGEDCOM RS416PNCv2 V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS416Pv2 V4.X", "product_id": "CSAFPID-0049" } } ], "category": "product_name", "name": "RUGGEDCOM RS416Pv2 V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS416Pv2 V5.X", "product_id": "CSAFPID-0050" } } ], "category": "product_name", "name": "RUGGEDCOM RS416Pv2 V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS416v2 V4.X", "product_id": "CSAFPID-0051" } } ], "category": "product_name", "name": "RUGGEDCOM RS416v2 V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS416v2 V5.X", "product_id": "CSAFPID-0052" } } ], "category": "product_name", "name": "RUGGEDCOM RS416v2 V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900", "product_id": "CSAFPID-0053" } } ], "category": "product_name", "name": "RUGGEDCOM RS900" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900 (32M) V4.X", "product_id": "CSAFPID-0054" } } ], "category": "product_name", "name": "RUGGEDCOM RS900 (32M) V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900 (32M) V5.X", "product_id": "CSAFPID-0055" } } ], "category": "product_name", "name": "RUGGEDCOM RS900 (32M) V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900G", "product_id": "CSAFPID-0056" } } ], "category": "product_name", "name": "RUGGEDCOM RS900G" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900G (32M) V4.X", "product_id": "CSAFPID-0057" } } ], "category": "product_name", "name": "RUGGEDCOM RS900G (32M) V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900G (32M) V5.X", "product_id": "CSAFPID-0058" } } ], "category": "product_name", "name": "RUGGEDCOM RS900G (32M) V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900GNC", "product_id": "CSAFPID-0059" } } ], "category": "product_name", "name": "RUGGEDCOM RS900GNC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900GNC(32M) V4.X", "product_id": "CSAFPID-0060" } } ], "category": "product_name", "name": "RUGGEDCOM RS900GNC(32M) V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900GNC(32M) V5.X", "product_id": "CSAFPID-0061" } } ], "category": "product_name", "name": "RUGGEDCOM RS900GNC(32M) V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900GP", "product_id": "CSAFPID-0062" } } ], "category": "product_name", "name": "RUGGEDCOM RS900GP" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900GPNC", "product_id": "CSAFPID-0063" } } ], "category": "product_name", "name": "RUGGEDCOM RS900GPNC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900M-GETS-C01", "product_id": "CSAFPID-0064" } } ], "category": "product_name", "name": "RUGGEDCOM RS900M-GETS-C01" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900M-GETS-XX", "product_id": "CSAFPID-0065" } } ], "category": "product_name", "name": "RUGGEDCOM RS900M-GETS-XX" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900M-STND-C01", "product_id": "CSAFPID-0066" } } ], "category": "product_name", "name": "RUGGEDCOM RS900M-STND-C01" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900M-STND-XX", "product_id": "CSAFPID-0067" } } ], "category": "product_name", "name": "RUGGEDCOM RS900M-STND-XX" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900MNC-GETS-C01", "product_id": "CSAFPID-0068" } } ], "category": "product_name", "name": "RUGGEDCOM RS900MNC-GETS-C01" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900MNC-GETS-XX", "product_id": "CSAFPID-0069" } } ], "category": "product_name", "name": "RUGGEDCOM RS900MNC-GETS-XX" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900MNC-STND-XX", "product_id": "CSAFPID-0070" } } ], "category": "product_name", "name": "RUGGEDCOM RS900MNC-STND-XX" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900MNC-STND-XX-C01", "product_id": "CSAFPID-0071" } } ], "category": "product_name", "name": "RUGGEDCOM RS900MNC-STND-XX-C01" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900NC", "product_id": "CSAFPID-0072" } } ], "category": "product_name", "name": "RUGGEDCOM RS900NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900NC(32M) V4.X", "product_id": "CSAFPID-0073" } } ], "category": "product_name", "name": "RUGGEDCOM RS900NC(32M) V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900NC(32M) V5.X", "product_id": "CSAFPID-0074" } } ], "category": "product_name", "name": "RUGGEDCOM RS900NC(32M) V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900W", "product_id": "CSAFPID-0075" } } ], "category": "product_name", "name": "RUGGEDCOM RS900W" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS910", "product_id": "CSAFPID-0076" } } ], "category": "product_name", "name": "RUGGEDCOM RS910" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS910NC", "product_id": "CSAFPID-0077" } } ], "category": "product_name", "name": "RUGGEDCOM RS910NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS910W", "product_id": "CSAFPID-0078" } } ], "category": "product_name", "name": "RUGGEDCOM RS910W" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS940G", "product_id": "CSAFPID-0079" } } ], "category": "product_name", "name": "RUGGEDCOM RS940G" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS940GNC", "product_id": "CSAFPID-0080" } } ], "category": "product_name", "name": "RUGGEDCOM RS940GNC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS1600", "product_id": "CSAFPID-0081" } } ], "category": "product_name", "name": "RUGGEDCOM RS1600" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS1600F", "product_id": "CSAFPID-0082" } } ], "category": "product_name", "name": "RUGGEDCOM RS1600F" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS1600FNC", "product_id": "CSAFPID-0083" } } ], "category": "product_name", "name": "RUGGEDCOM RS1600FNC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS1600NC", "product_id": "CSAFPID-0084" } } ], "category": "product_name", "name": "RUGGEDCOM RS1600NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS1600T", "product_id": "CSAFPID-0085" } } ], "category": "product_name", "name": "RUGGEDCOM RS1600T" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS1600TNC", "product_id": "CSAFPID-0086" } } ], "category": "product_name", "name": "RUGGEDCOM RS1600TNC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS8000", "product_id": "CSAFPID-0087" } } ], "category": "product_name", "name": "RUGGEDCOM RS8000" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS8000A", "product_id": "CSAFPID-0088" } } ], "category": "product_name", "name": "RUGGEDCOM RS8000A" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS8000ANC", "product_id": "CSAFPID-0089" } } ], "category": "product_name", "name": "RUGGEDCOM RS8000ANC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS8000H", "product_id": "CSAFPID-0090" } } ], "category": "product_name", "name": "RUGGEDCOM RS8000H" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS8000HNC", "product_id": "CSAFPID-0091" } } ], "category": "product_name", "name": "RUGGEDCOM RS8000HNC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS8000NC", "product_id": "CSAFPID-0092" } } ], "category": "product_name", "name": "RUGGEDCOM RS8000NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS8000T", "product_id": "CSAFPID-0093" } } ], "category": "product_name", "name": "RUGGEDCOM RS8000T" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS8000TNC", "product_id": "CSAFPID-0094" } } ], "category": "product_name", "name": "RUGGEDCOM RS8000TNC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG907R", "product_id": "CSAFPID-0095" } } ], "category": "product_name", "name": "RUGGEDCOM RSG907R" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG908C", "product_id": "CSAFPID-0096" } } ], "category": "product_name", "name": "RUGGEDCOM RSG908C" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG909R", "product_id": "CSAFPID-0097" } } ], "category": "product_name", "name": "RUGGEDCOM RSG909R" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG910C", "product_id": "CSAFPID-0098" } } ], "category": "product_name", "name": "RUGGEDCOM RSG910C" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG920P V4.X", "product_id": "CSAFPID-0099" } } ], "category": "product_name", "name": "RUGGEDCOM RSG920P V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG920P V5.X", "product_id": "CSAFPID-0100" } } ], "category": "product_name", "name": "RUGGEDCOM RSG920P V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG920PNC V4.X", "product_id": "CSAFPID-0101" } } ], "category": "product_name", "name": "RUGGEDCOM RSG920PNC V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG920PNC V5.X", "product_id": "CSAFPID-0102" } } ], "category": "product_name", "name": "RUGGEDCOM RSG920PNC V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2100", "product_id": "CSAFPID-0103" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2100" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2100 (32M) V4.X", "product_id": "CSAFPID-0104" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2100 (32M) V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2100 (32M) V5.X", "product_id": "CSAFPID-0105" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2100 (32M) V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2100NC", "product_id": "CSAFPID-0106" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2100NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2100NC(32M) V4.X", "product_id": "CSAFPID-0107" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2100NC(32M) V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2100NC(32M) V5.X", "product_id": "CSAFPID-0108" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2100NC(32M) V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2100P", "product_id": "CSAFPID-0109" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2100P" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2100PNC", "product_id": "CSAFPID-0110" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2100PNC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2200", "product_id": "CSAFPID-0111" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2200" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2200NC", "product_id": "CSAFPID-0112" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2200NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2288 V4.X", "product_id": "CSAFPID-0113" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2288 V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2288 V5.X", "product_id": "CSAFPID-0114" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2288 V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2288NC V4.X", "product_id": "CSAFPID-0115" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2288NC V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2288NC V5.X", "product_id": "CSAFPID-0116" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2288NC V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2300 V4.X", "product_id": "CSAFPID-0117" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2300 V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2300 V5.X", "product_id": "CSAFPID-0118" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2300 V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2300NC V4.X", "product_id": "CSAFPID-0119" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2300NC V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2300NC V5.X", "product_id": "CSAFPID-0120" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2300NC V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2300P V4.X", "product_id": "CSAFPID-0121" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2300P V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2300P V5.X", "product_id": "CSAFPID-0122" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2300P V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2300PNC V4.X", "product_id": "CSAFPID-0123" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2300PNC V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2300PNC V5.X", "product_id": "CSAFPID-0124" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2300PNC V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2488 V4.X", "product_id": "CSAFPID-0125" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2488 V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2488 V5.X", "product_id": "CSAFPID-0126" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2488 V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2488NC V4.X", "product_id": "CSAFPID-0127" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2488NC V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2488NC V5.X", "product_id": "CSAFPID-0128" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2488NC V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSL910", "product_id": "CSAFPID-0129" } } ], "category": "product_name", "name": "RUGGEDCOM RSL910" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSL910NC", "product_id": "CSAFPID-0130" } } ], "category": "product_name", "name": "RUGGEDCOM RSL910NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RST916C", "product_id": "CSAFPID-0131" } } ], "category": "product_name", "name": "RUGGEDCOM RST916C" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RST916P", "product_id": "CSAFPID-0132" } } ], "category": "product_name", "name": "RUGGEDCOM RST916P" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RST2228", "product_id": "CSAFPID-0133" } } ], "category": "product_name", "name": "RUGGEDCOM RST2228" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RST2228P", "product_id": "CSAFPID-0134" } } ], "category": "product_name", "name": "RUGGEDCOM RST2228P" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)", "product_id": "CSAFPID-0135", "product_identification_helper": { "model_numbers": [ "6GK5804-0AP00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2)", "product_id": "CSAFPID-0136", "product_identification_helper": { "model_numbers": [ "6GK5812-1AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2)", "product_id": "CSAFPID-0137", "product_identification_helper": { "model_numbers": [ "6GK5812-1BA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2)", "product_id": "CSAFPID-0138", "product_identification_helper": { "model_numbers": [ "6GK5816-1AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2)", "product_id": "CSAFPID-0139", "product_identification_helper": { "model_numbers": [ "6GK5816-1BA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)", "product_id": "CSAFPID-0140", "product_identification_helper": { "model_numbers": [ "6GK5826-2AB00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)", "product_id": "CSAFPID-0141", "product_identification_helper": { "model_numbers": [ "6GK5874-2AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2)", "product_id": "CSAFPID-0142", "product_identification_helper": { "model_numbers": [ "6GK5874-3AA00-2FA2" ] } } } ], "category": "product_name", "name": "SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)", "product_id": "CSAFPID-0143", "product_identification_helper": { "model_numbers": [ "6GK5874-3AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M876-3 (6GK5876-3AA02-2BA2)", "product_id": "CSAFPID-0144", "product_identification_helper": { "model_numbers": [ "6GK5876-3AA02-2BA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-3 (6GK5876-3AA02-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)", "product_id": "CSAFPID-0145", "product_identification_helper": { "model_numbers": [ "6GK5876-3AA02-2EA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)", "product_id": "CSAFPID-0146", "product_identification_helper": { "model_numbers": [ "6GK5876-4AA10-2BA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)", "product_id": "CSAFPID-0147", "product_identification_helper": { "model_numbers": [ "6GK5876-4AA00-2BA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)", "product_id": "CSAFPID-0148", "product_identification_helper": { "model_numbers": [ "6GK5876-4AA00-2DA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1)", "product_id": "CSAFPID-0149", "product_identification_helper": { "model_numbers": [ "6GK5853-2EA10-2AA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1)", "product_id": "CSAFPID-0150", "product_identification_helper": { "model_numbers": [ "6GK5853-2EA10-2BA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)", "product_id": "CSAFPID-0151", "product_identification_helper": { "model_numbers": [ "6GK5853-2EA00-2DA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1)", "product_id": "CSAFPID-0152", "product_identification_helper": { "model_numbers": [ "6GK5856-2EA10-3AA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1)", "product_id": "CSAFPID-0153", "product_identification_helper": { "model_numbers": [ "6GK5856-2EA10-3BA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1)", "product_id": "CSAFPID-0154", "product_identification_helper": { "model_numbers": [ "6GK5856-2EA00-3FA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)", "product_id": "CSAFPID-0155", "product_identification_helper": { "model_numbers": [ "6GK5856-2EA00-3DA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)", "product_id": "CSAFPID-0156", "product_identification_helper": { "model_numbers": [ "6GK5856-2EA00-3AA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2)", "product_id": "CSAFPID-0157", "product_identification_helper": { "model_numbers": [ "6GK5615-0AA01-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2)", "product_id": "CSAFPID-0158", "product_identification_helper": { "model_numbers": [ "6GK5615-0AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)", "product_id": "CSAFPID-0159", "product_identification_helper": { "model_numbers": [ "6GK5622-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE SC626-2C (6GK5626-2GS00-2AC2)", "product_id": "CSAFPID-0160", "product_identification_helper": { "model_numbers": [ "6GK5626-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC626-2C (6GK5626-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)", "product_id": "CSAFPID-0161", "product_identification_helper": { "model_numbers": [ "6GK5632-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)", "product_id": "CSAFPID-0162", "product_identification_helper": { "model_numbers": [ "6GK5636-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)", "product_id": "CSAFPID-0163", "product_identification_helper": { "model_numbers": [ "6GK5642-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)", "product_id": "CSAFPID-0164", "product_identification_helper": { "model_numbers": [ "6GK5646-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)", "product_id": "CSAFPID-0165", "product_identification_helper": { "model_numbers": [ "6GK5721-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)", "product_id": "CSAFPID-0166", "product_identification_helper": { "model_numbers": [ "6GK5721-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)", "product_id": "CSAFPID-0167", "product_identification_helper": { "model_numbers": [ "6GK5722-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)", "product_id": "CSAFPID-0168", "product_identification_helper": { "model_numbers": [ "6GK5722-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)", "product_id": "CSAFPID-0169", "product_identification_helper": { "model_numbers": [ "6GK5722-1FC00-0AC0" ] } } } ], "category": "product_name", "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)", "product_id": "CSAFPID-0170", "product_identification_helper": { "model_numbers": [ "6GK5734-1FX00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)", "product_id": "CSAFPID-0171", "product_identification_helper": { "model_numbers": [ "6GK5734-1FX00-0AA6" ] } } } ], "category": "product_name", "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)", "product_id": "CSAFPID-0172", "product_identification_helper": { "model_numbers": [ "6GK5734-1FX00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)", "product_id": "CSAFPID-0173", "product_identification_helper": { "model_numbers": [ "6GK5734-1FX00-0AB6" ] } } } ], "category": "product_name", "name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)", "product_id": "CSAFPID-0174", "product_identification_helper": { "model_numbers": [ "6GK5738-1GY00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)", "product_id": "CSAFPID-0175", "product_identification_helper": { "model_numbers": [ "6GK5738-1GY00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)", "product_id": "CSAFPID-0176", "product_identification_helper": { "model_numbers": [ "6GK5748-1GD00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)", "product_id": "CSAFPID-0177", "product_identification_helper": { "model_numbers": [ "6GK5748-1GD00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)", "product_id": "CSAFPID-0178", "product_identification_helper": { "model_numbers": [ "6GK5748-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)", "product_id": "CSAFPID-0179", "product_identification_helper": { "model_numbers": [ "6GK5748-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)", "product_id": "CSAFPID-0180", "product_identification_helper": { "model_numbers": [ "6GK5761-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)", "product_id": "CSAFPID-0181", "product_identification_helper": { "model_numbers": [ "6GK5761-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)", "product_id": "CSAFPID-0182", "product_identification_helper": { "model_numbers": [ "6GK5774-1FY00-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)", "product_id": "CSAFPID-0183", "product_identification_helper": { "model_numbers": [ "6GK5774-1FY00-0TB0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)", "product_id": "CSAFPID-0184", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)", "product_id": "CSAFPID-0185", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AA6" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)", "product_id": "CSAFPID-0186", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)", "product_id": "CSAFPID-0187", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AC0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)", "product_id": "CSAFPID-0188", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AB6" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)", "product_id": "CSAFPID-0189", "product_identification_helper": { "model_numbers": [ "6GK5778-1GY00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)", "product_id": "CSAFPID-0190", "product_identification_helper": { "model_numbers": [ "6GK5778-1GY00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)", "product_id": "CSAFPID-0191", "product_identification_helper": { "model_numbers": [ "6GK5778-1GY00-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)", "product_id": "CSAFPID-0192", "product_identification_helper": { "model_numbers": [ "6GK5778-1GY00-0TB0" ] } } } ], "category": "product_name", "name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)", "product_id": "CSAFPID-0193", "product_identification_helper": { "model_numbers": [ "6GK5786-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)", "product_id": "CSAFPID-0194", "product_identification_helper": { "model_numbers": [ "6GK5786-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)", "product_id": "CSAFPID-0195", "product_identification_helper": { "model_numbers": [ "6GK5786-2FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)", "product_id": "CSAFPID-0196", "product_identification_helper": { "model_numbers": [ "6GK5786-2FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)", "product_id": "CSAFPID-0197", "product_identification_helper": { "model_numbers": [ "6GK5786-2FC00-0AC0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)", "product_id": "CSAFPID-0198", "product_identification_helper": { "model_numbers": [ "6GK5786-2FE00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)", "product_id": "CSAFPID-0199", "product_identification_helper": { "model_numbers": [ "6GK5786-2FE00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)", "product_id": "CSAFPID-0200", "product_identification_helper": { "model_numbers": [ "6GK5786-2HC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)", "product_id": "CSAFPID-0201", "product_identification_helper": { "model_numbers": [ "6GK5786-2HC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)", "product_id": "CSAFPID-0202", "product_identification_helper": { "model_numbers": [ "6GK5788-1GD00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)", "product_id": "CSAFPID-0203", "product_identification_helper": { "model_numbers": [ "6GK5788-1GD00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)", "product_id": "CSAFPID-0204", "product_identification_helper": { "model_numbers": [ "6GK5788-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)", "product_id": "CSAFPID-0205", "product_identification_helper": { "model_numbers": [ "6GK5788-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)", "product_id": "CSAFPID-0206", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)", "product_id": "CSAFPID-0207", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)", "product_id": "CSAFPID-0208", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)", "product_id": "CSAFPID-0209", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0TB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)", "product_id": "CSAFPID-0210", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0TC0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)", "product_id": "CSAFPID-0211", "product_identification_helper": { "model_numbers": [ "6GK5788-2FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)", "product_id": "CSAFPID-0212", "product_identification_helper": { "model_numbers": [ "6GK5788-2FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)", "product_id": "CSAFPID-0213", "product_identification_helper": { "model_numbers": [ "6GK5788-2FC00-0AC0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)", "product_id": "CSAFPID-0214", "product_identification_helper": { "model_numbers": [ "6GK5748-1GY01-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)", "product_id": "CSAFPID-0215", "product_identification_helper": { "model_numbers": [ "6GK5748-1GY01-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)", "product_id": "CSAFPID-0216", "product_identification_helper": { "model_numbers": [ "6GK5788-1GY01-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)", "product_id": "CSAFPID-0217", "product_identification_helper": { "model_numbers": [ "6GK5788-2GY01-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)", "product_id": "CSAFPID-0218", "product_identification_helper": { "model_numbers": [ "6GK5788-2GY01-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)", "product_id": "CSAFPID-0219", "product_identification_helper": { "model_numbers": [ "6GK5788-2HY01-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)", "product_id": "CSAFPID-0220", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-7DA0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0)", "product_id": "CSAFPID-0221", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-7DC0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0)", "product_id": "CSAFPID-0222", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-7DB0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0)", "product_id": "CSAFPID-0223", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7DA0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0)", "product_id": "CSAFPID-0224", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7DC0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)", "product_id": "CSAFPID-0225", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7DB0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0)", "product_id": "CSAFPID-0226", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7TA0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0)", "product_id": "CSAFPID-0227", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7TC0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)", "product_id": "CSAFPID-0228", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7TB0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)", "product_id": "CSAFPID-0229", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-3AA0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)", "product_id": "CSAFPID-0230", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-3DA0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0)", "product_id": "CSAFPID-0231", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-3AB0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0)", "product_id": "CSAFPID-0232", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-3DB0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0)", "product_id": "CSAFPID-0233", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-3DA0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0)", "product_id": "CSAFPID-0234", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-3DC0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0)", "product_id": "CSAFPID-0235", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-3DB0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3)", "product_id": "CSAFPID-0236", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-2EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3)", "product_id": "CSAFPID-0237", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-2GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3)", "product_id": "CSAFPID-0238", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-4EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3)", "product_id": "CSAFPID-0239", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-4GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3)", "product_id": "CSAFPID-0240", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-1EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3)", "product_id": "CSAFPID-0241", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-1GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3)", "product_id": "CSAFPID-0242", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-3EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3)", "product_id": "CSAFPID-0243", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-3GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3)", "product_id": "CSAFPID-0244", "product_identification_helper": { "model_numbers": [ "6GK5304-2BD00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3)", "product_id": "CSAFPID-0245", "product_identification_helper": { "model_numbers": [ "6GK5306-1BF00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3)", "product_id": "CSAFPID-0246", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-2EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3)", "product_id": "CSAFPID-0247", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-2GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3)", "product_id": "CSAFPID-0248", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-4EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3)", "product_id": "CSAFPID-0249", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-4GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3)", "product_id": "CSAFPID-0250", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-1EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3)", "product_id": "CSAFPID-0251", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-1GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3)", "product_id": "CSAFPID-0252", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-3EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3)", "product_id": "CSAFPID-0253", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-3GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-3 (6GK5307-3BL00-2AA3)", "product_id": "CSAFPID-0254", "product_identification_helper": { "model_numbers": [ "6GK5307-3BL00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-3 (6GK5307-3BL00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-3 (6GK5307-3BL10-2AA3)", "product_id": "CSAFPID-0255", "product_identification_helper": { "model_numbers": [ "6GK5307-3BL10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-3 (6GK5307-3BL10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3)", "product_id": "CSAFPID-0256", "product_identification_helper": { "model_numbers": [ "6GK5307-3BM00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3)", "product_id": "CSAFPID-0257", "product_identification_helper": { "model_numbers": [ "6GK5307-3BM10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2 (6GK5308-2FL00-2AA3)", "product_id": "CSAFPID-0258", "product_identification_helper": { "model_numbers": [ "6GK5308-2FL00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2 (6GK5308-2FL00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2 (6GK5308-2FL10-2AA3)", "product_id": "CSAFPID-0259", "product_identification_helper": { "model_numbers": [ "6GK5308-2FL10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2 (6GK5308-2FL10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3)", "product_id": "CSAFPID-0260", "product_identification_helper": { "model_numbers": [ "6GK5308-2FM00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3)", "product_id": "CSAFPID-0261", "product_identification_helper": { "model_numbers": [ "6GK5308-2FM10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3)", "product_id": "CSAFPID-0262", "product_identification_helper": { "model_numbers": [ "6GK5308-2FN00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3)", "product_id": "CSAFPID-0263", "product_identification_helper": { "model_numbers": [ "6GK5308-2FN10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3)", "product_id": "CSAFPID-0264", "product_identification_helper": { "model_numbers": [ "6GK5308-2FP00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3)", "product_id": "CSAFPID-0265", "product_identification_helper": { "model_numbers": [ "6GK5308-2FP10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M (6GK5308-2GG00-2AA2)", "product_id": "CSAFPID-0266", "product_identification_helper": { "model_numbers": [ "6GK5308-2GG00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M (6GK5308-2GG00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M (6GK5308-2GG10-2AA2)", "product_id": "CSAFPID-0267", "product_identification_helper": { "model_numbers": [ "6GK5308-2GG10-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M (6GK5308-2GG10-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2)", "product_id": "CSAFPID-0268", "product_identification_helper": { "model_numbers": [ "6GK5308-2QG00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2)", "product_id": "CSAFPID-0269", "product_identification_helper": { "model_numbers": [ "6GK5308-2QG10-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2)", "product_id": "CSAFPID-0270", "product_identification_helper": { "model_numbers": [ "6GK5308-2GG00-2CA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2)", "product_id": "CSAFPID-0271", "product_identification_helper": { "model_numbers": [ "6GK5308-2GG10-2CA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X310 (6GK5310-0FA00-2AA3)", "product_id": "CSAFPID-0272", "product_identification_helper": { "model_numbers": [ "6GK5310-0FA00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X310 (6GK5310-0FA00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X310 (6GK5310-0FA10-2AA3)", "product_id": "CSAFPID-0273", "product_identification_helper": { "model_numbers": [ "6GK5310-0FA10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X310 (6GK5310-0FA10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X310FE (6GK5310-0BA00-2AA3)", "product_id": "CSAFPID-0274", "product_identification_helper": { "model_numbers": [ "6GK5310-0BA00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X310FE (6GK5310-0BA00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X310FE (6GK5310-0BA10-2AA3)", "product_id": "CSAFPID-0275", "product_identification_helper": { "model_numbers": [ "6GK5310-0BA10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X310FE (6GK5310-0BA10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3)", "product_id": "CSAFPID-0276", "product_identification_helper": { "model_numbers": [ "6GK5320-1BD00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3)", "product_id": "CSAFPID-0277", "product_identification_helper": { "model_numbers": [ "6GK5320-3BF00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X408-2 (6GK5408-2FD00-2AA2)", "product_id": "CSAFPID-0278", "product_identification_helper": { "model_numbers": [ "6GK5408-2FD00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X408-2 (6GK5408-2FD00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2)", "product_id": "CSAFPID-0279", "product_identification_helper": { "model_numbers": [ "6GK5205-3BB00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2)", "product_id": "CSAFPID-0280", "product_identification_helper": { "model_numbers": [ "6GK5205-3BB00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2)", "product_id": "CSAFPID-0281", "product_identification_helper": { "model_numbers": [ "6GK5205-3BD00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2)", "product_id": "CSAFPID-0282", "product_identification_helper": { "model_numbers": [ "6GK5205-3BD00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2)", "product_id": "CSAFPID-0283", "product_identification_helper": { "model_numbers": [ "6GK5205-3BF00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2)", "product_id": "CSAFPID-0284", "product_identification_helper": { "model_numbers": [ "6GK5205-3BF00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2)", "product_id": "CSAFPID-0285", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2)", "product_id": "CSAFPID-0286", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2)", "product_id": "CSAFPID-0287", "product_identification_helper": { "model_numbers": [ "6GK5213-3BD00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2)", "product_id": "CSAFPID-0288", "product_identification_helper": { "model_numbers": [ "6GK5213-3BD00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2)", "product_id": "CSAFPID-0289", "product_identification_helper": { "model_numbers": [ "6GK5213-3BB00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2)", "product_id": "CSAFPID-0290", "product_identification_helper": { "model_numbers": [ "6GK5213-3BB00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2)", "product_id": "CSAFPID-0291", "product_identification_helper": { "model_numbers": [ "6GK5213-3BF00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2)", "product_id": "CSAFPID-0292", "product_identification_helper": { "model_numbers": [ "6GK5213-3BF00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2)", "product_id": "CSAFPID-0293", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2)", "product_id": "CSAFPID-0294", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2)", "product_id": "CSAFPID-0295", "product_identification_helper": { "model_numbers": [ "6GK5206-2BD00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2)", "product_id": "CSAFPID-0296", "product_identification_helper": { "model_numbers": [ "6GK5206-2BB00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2)", "product_id": "CSAFPID-0297", "product_identification_helper": { "model_numbers": [ "6GK5206-2RS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2)", "product_id": "CSAFPID-0298", "product_identification_helper": { "model_numbers": [ "6GK5206-2RS00-5AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2)", "product_id": "CSAFPID-0299", "product_identification_helper": { "model_numbers": [ "6GK5206-2RS00-5FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2)", "product_id": "CSAFPID-0300", "product_identification_helper": { "model_numbers": [ "6GK5206-2BS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2)", "product_id": "CSAFPID-0301", "product_identification_helper": { "model_numbers": [ "6GK5206-2BS00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2)", "product_id": "CSAFPID-0302", "product_identification_helper": { "model_numbers": [ "6GK5206-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2)", "product_id": "CSAFPID-0303", "product_identification_helper": { "model_numbers": [ "6GK5206-2GS00-2TC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2)", "product_id": "CSAFPID-0304", "product_identification_helper": { "model_numbers": [ "6GK5206-2GS00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC208 (6GK5208-0BA00-2AC2)", "product_id": "CSAFPID-0305", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208 (6GK5208-0BA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2)", "product_id": "CSAFPID-0306", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC208G (6GK5208-0GA00-2AC2)", "product_id": "CSAFPID-0307", "product_identification_helper": { "model_numbers": [ "6GK5208-0GA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G (6GK5208-0GA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2)", "product_id": "CSAFPID-0308", "product_identification_helper": { "model_numbers": [ "6GK5208-0GA00-2TC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2)", "product_id": "CSAFPID-0309", "product_identification_helper": { "model_numbers": [ "6GK5208-0GA00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2)", "product_id": "CSAFPID-0310", "product_identification_helper": { "model_numbers": [ "6GK5208-0RA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2)", "product_id": "CSAFPID-0311", "product_identification_helper": { "model_numbers": [ "6GK5208-0RA00-5AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC216 (6GK5216-0BA00-2AC2)", "product_id": "CSAFPID-0312", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216 (6GK5216-0BA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2)", "product_id": "CSAFPID-0313", "product_identification_helper": { "model_numbers": [ "6GK5216-3RS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2)", "product_id": "CSAFPID-0314", "product_identification_helper": { "model_numbers": [ "6GK5216-3RS00-5AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2)", "product_id": "CSAFPID-0315", "product_identification_helper": { "model_numbers": [ "6GK5216-4BS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2)", "product_id": "CSAFPID-0316", "product_identification_helper": { "model_numbers": [ "6GK5216-4GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2)", "product_id": "CSAFPID-0317", "product_identification_helper": { "model_numbers": [ "6GK5216-4GS00-2TC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2)", "product_id": "CSAFPID-0318", "product_identification_helper": { "model_numbers": [ "6GK5216-4GS00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2)", "product_id": "CSAFPID-0319", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC224 (6GK5224-0BA00-2AC2)", "product_id": "CSAFPID-0320", "product_identification_helper": { "model_numbers": [ "6GK5224-0BA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC224 (6GK5224-0BA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2)", "product_id": "CSAFPID-0321", "product_identification_helper": { "model_numbers": [ "6GK5224-4GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2)", "product_id": "CSAFPID-0322", "product_identification_helper": { "model_numbers": [ "6GK5224-4GS00-2TC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2)", "product_id": "CSAFPID-0323", "product_identification_helper": { "model_numbers": [ "6GK5224-4GS00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XCH328 (6GK5328-4TS01-2EC2)", "product_id": "CSAFPID-0324", "product_identification_helper": { "model_numbers": [ "6GK5328-4TS01-2EC2" ] } } } ], "category": "product_name", "name": "SCALANCE XCH328 (6GK5328-4TS01-2EC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XCM324 (6GK5324-8TS01-2AC2)", "product_id": "CSAFPID-0325", "product_identification_helper": { "model_numbers": [ "6GK5324-8TS01-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XCM324 (6GK5324-8TS01-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XCM328 (6GK5328-4TS01-2AC2)", "product_id": "CSAFPID-0326", "product_identification_helper": { "model_numbers": [ "6GK5328-4TS01-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XCM328 (6GK5328-4TS01-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XCM332 (6GK5332-0GA01-2AC2)", "product_id": "CSAFPID-0327", "product_identification_helper": { "model_numbers": [ "6GK5332-0GA01-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XCM332 (6GK5332-0GA01-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XF204 (6GK5204-0BA00-2GF2)", "product_id": "CSAFPID-0328", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2GF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204 (6GK5204-0BA00-2GF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2)", "product_id": "CSAFPID-0329", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2YF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2)", "product_id": "CSAFPID-0330", "product_identification_helper": { "model_numbers": [ "6GK5204-2AA00-2GF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2)", "product_id": "CSAFPID-0331", "product_identification_helper": { "model_numbers": [ "6GK5204-2AA00-2YF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2)", "product_id": "CSAFPID-0332", "product_identification_helper": { "model_numbers": [ "6GK5408-4GP00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2)", "product_id": "CSAFPID-0333", "product_identification_helper": { "model_numbers": [ "6GK5408-4GQ00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2)", "product_id": "CSAFPID-0334", "product_identification_helper": { "model_numbers": [ "6GK5408-8GS00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2)", "product_id": "CSAFPID-0335", "product_identification_helper": { "model_numbers": [ "6GK5408-8GR00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2)", "product_id": "CSAFPID-0336", "product_identification_helper": { "model_numbers": [ "6GK5416-4GS00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2)", "product_id": "CSAFPID-0337", "product_identification_helper": { "model_numbers": [ "6GK5416-4GR00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XP208 (6GK5208-0HA00-2AS6)", "product_id": "CSAFPID-0338", "product_identification_helper": { "model_numbers": [ "6GK5208-0HA00-2AS6" ] } } } ], "category": "product_name", "name": "SCALANCE XP208 (6GK5208-0HA00-2AS6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6)", "product_id": "CSAFPID-0339", "product_identification_helper": { "model_numbers": [ "6GK5208-0HA00-2TS6" ] } } } ], "category": "product_name", "name": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6)", "product_id": "CSAFPID-0340", "product_identification_helper": { "model_numbers": [ "6GK5208-0HA00-2ES6" ] } } } ], "category": "product_name", "name": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6)", "product_id": "CSAFPID-0341", "product_identification_helper": { "model_numbers": [ "6GK5208-0UA00-5ES6" ] } } } ], "category": "product_name", "name": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XP216 (6GK5216-0HA00-2AS6)", "product_id": "CSAFPID-0342", "product_identification_helper": { "model_numbers": [ "6GK5216-0HA00-2AS6" ] } } } ], "category": "product_name", "name": "SCALANCE XP216 (6GK5216-0HA00-2AS6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6)", "product_id": "CSAFPID-0343", "product_identification_helper": { "model_numbers": [ "6GK5216-0HA00-2TS6" ] } } } ], "category": "product_name", "name": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6)", "product_id": "CSAFPID-0344", "product_identification_helper": { "model_numbers": [ "6GK5216-0HA00-2ES6" ] } } } ], "category": "product_name", "name": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6)", "product_id": "CSAFPID-0345", "product_identification_helper": { "model_numbers": [ "6GK5216-0UA00-5ES6" ] } } } ], "category": "product_name", "name": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2)", "product_id": "CSAFPID-0346", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-2ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2)", "product_id": "CSAFPID-0347", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-2ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2)", "product_id": "CSAFPID-0348", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-2JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2)", "product_id": "CSAFPID-0349", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-2JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2)", "product_id": "CSAFPID-0350", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-4ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2)", "product_id": "CSAFPID-0351", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-4ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2)", "product_id": "CSAFPID-0352", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-4JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2)", "product_id": "CSAFPID-0353", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-4JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2)", "product_id": "CSAFPID-0354", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-1ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2)", "product_id": "CSAFPID-0355", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-1ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2)", "product_id": "CSAFPID-0356", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-1JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2)", "product_id": "CSAFPID-0357", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-1JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2)", "product_id": "CSAFPID-0358", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-3ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2)", "product_id": "CSAFPID-0359", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-3ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2)", "product_id": "CSAFPID-0360", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-3JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2)", "product_id": "CSAFPID-0361", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-3JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2)", "product_id": "CSAFPID-0362", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-1AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG10-1AR2)", "product_id": "CSAFPID-0363", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG10-1AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG10-1AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2)", "product_id": "CSAFPID-0364", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-1HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG10-1HR2)", "product_id": "CSAFPID-0365", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG10-1HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG10-1HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2)", "product_id": "CSAFPID-0366", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG10-3AR2)", "product_id": "CSAFPID-0367", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG10-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG10-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2)", "product_id": "CSAFPID-0368", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-3HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG10-3HR2)", "product_id": "CSAFPID-0369", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG10-3HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG10-3HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2)", "product_id": "CSAFPID-0370", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-1CR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG10-1CR2)", "product_id": "CSAFPID-0371", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG10-1CR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG10-1CR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2)", "product_id": "CSAFPID-0372", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-1AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2)", "product_id": "CSAFPID-0373", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-1AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2)", "product_id": "CSAFPID-0374", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-1HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2)", "product_id": "CSAFPID-0375", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-1HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2)", "product_id": "CSAFPID-0376", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2)", "product_id": "CSAFPID-0377", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2)", "product_id": "CSAFPID-0378", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-3HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2)", "product_id": "CSAFPID-0379", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-3HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2)", "product_id": "CSAFPID-0380", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-1CR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2)", "product_id": "CSAFPID-0381", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-1CR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3)", "product_id": "CSAFPID-0382", "product_identification_helper": { "model_numbers": [ "6GK5324-0BA00-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3)", "product_id": "CSAFPID-0383", "product_identification_helper": { "model_numbers": [ "6GK5324-0BA00-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3)", "product_id": "CSAFPID-0384", "product_identification_helper": { "model_numbers": [ "6GK5326-2QS00-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3)", "product_id": "CSAFPID-0385", "product_identification_helper": { "model_numbers": [ "6GK5326-2QS00-3RR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3)", "product_id": "CSAFPID-0386", "product_identification_helper": { "model_numbers": [ "6GK5328-4FS00-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3)", "product_id": "CSAFPID-0387", "product_identification_helper": { "model_numbers": [ "6GK5328-4FS00-3RR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3)", "product_id": "CSAFPID-0388", "product_identification_helper": { "model_numbers": [ "6GK5328-4FS00-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3)", "product_id": "CSAFPID-0389", "product_identification_helper": { "model_numbers": [ "6GK5328-4FS00-2RR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3)", "product_id": "CSAFPID-0390", "product_identification_helper": { "model_numbers": [ "6GK5328-4SS00-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3)", "product_id": "CSAFPID-0391", "product_identification_helper": { "model_numbers": [ "6GK5328-4SS00-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2)", "product_id": "CSAFPID-0392", "product_identification_helper": { "model_numbers": [ "6GK5524-8GS00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2)", "product_id": "CSAFPID-0393", "product_identification_helper": { "model_numbers": [ "6GK5524-8GR00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2)", "product_id": "CSAFPID-0394", "product_identification_helper": { "model_numbers": [ "6GK5524-8GS00-4AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2)", "product_id": "CSAFPID-0395", "product_identification_helper": { "model_numbers": [ "6GK5524-8GR00-4AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2)", "product_id": "CSAFPID-0396", "product_identification_helper": { "model_numbers": [ "6GK5524-8GS00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2)", "product_id": "CSAFPID-0397", "product_identification_helper": { "model_numbers": [ "6GK5524-8GR00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2)", "product_id": "CSAFPID-0398", "product_identification_helper": { "model_numbers": [ "6GK5526-8GS00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2)", "product_id": "CSAFPID-0399", "product_identification_helper": { "model_numbers": [ "6GK5526-8GR00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2)", "product_id": "CSAFPID-0400", "product_identification_helper": { "model_numbers": [ "6GK5526-8GS00-4AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2)", "product_id": "CSAFPID-0401", "product_identification_helper": { "model_numbers": [ "6GK5526-8GR00-4AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2)", "product_id": "CSAFPID-0402", "product_identification_helper": { "model_numbers": [ "6GK5526-8GS00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2)", "product_id": "CSAFPID-0403", "product_identification_helper": { "model_numbers": [ "6GK5526-8GR00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2)", "product_id": "CSAFPID-0404", "product_identification_helper": { "model_numbers": [ "6GK5528-0AA00-2HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2)", "product_id": "CSAFPID-0405", "product_identification_helper": { "model_numbers": [ "6GK5528-0AR00-2HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2)", "product_id": "CSAFPID-0406", "product_identification_helper": { "model_numbers": [ "6GK5528-0AA00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2)", "product_id": "CSAFPID-0407", "product_identification_helper": { "model_numbers": [ "6GK5528-0AR00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2)", "product_id": "CSAFPID-0408", "product_identification_helper": { "model_numbers": [ "6GK5552-0AA00-2HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2)", "product_id": "CSAFPID-0409", "product_identification_helper": { "model_numbers": [ "6GK5552-0AR00-2HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2)", "product_id": "CSAFPID-0410", "product_identification_helper": { "model_numbers": [ "6GK5552-0AR00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2)", "product_id": "CSAFPID-0411", "product_identification_helper": { "model_numbers": [ "6GK5552-0AA00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3)", "product_id": "CSAFPID-0412", "product_identification_helper": { "model_numbers": [ "6GK5334-2TS01-2ER3" ] } } } ], "category": "product_name", "name": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3)", "product_id": "CSAFPID-0413", "product_identification_helper": { "model_numbers": [ "6GK5334-2TS01-4AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3)", "product_id": "CSAFPID-0414", "product_identification_helper": { "model_numbers": [ "6GK5334-3TS01-4AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3)", "product_id": "CSAFPID-0415", "product_identification_helper": { "model_numbers": [ "6GK5334-2TS01-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3)", "product_id": "CSAFPID-0416", "product_identification_helper": { "model_numbers": [ "6GK5334-3TS01-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3)", "product_id": "CSAFPID-0417", "product_identification_helper": { "model_numbers": [ "6GK5334-2TS01-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3)", "product_id": "CSAFPID-0418", "product_identification_helper": { "model_numbers": [ "6GK5334-3TS01-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SINEC INS", "product_id": "CSAFPID-0419" } } ], "category": "product_name", "name": "SINEC INS" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3)", "product_id": "CSAFPID-0420", "product_identification_helper": { "model_numbers": [ "6AG1308-2FL10-4AA3" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2)", "product_id": "CSAFPID-0421", "product_identification_helper": { "model_numbers": [ "6AG1206-2BB00-7AC2" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2)", "product_id": "CSAFPID-0422", "product_identification_helper": { "model_numbers": [ "6AG1206-2BS00-7AC2" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2)", "product_id": "CSAFPID-0423", "product_identification_helper": { "model_numbers": [ "6AG1208-0BA00-7AC2" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2)", "product_id": "CSAFPID-0424", "product_identification_helper": { "model_numbers": [ "6AG1216-4BS00-7AC2" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "notes": [ { "category": "summary", "text": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify responses Access-Reject or Access-Accept using a chosen-prefix collision attack against MD5 Response Authenticator signature.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0081", "CSAFPID-0082", "CSAFPID-0083", "CSAFPID-0084", "CSAFPID-0085", "CSAFPID-0086", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041", "CSAFPID-0042", "CSAFPID-0043", "CSAFPID-0044", "CSAFPID-0045", "CSAFPID-0046", "CSAFPID-0047", "CSAFPID-0048", "CSAFPID-0049", "CSAFPID-0050", "CSAFPID-0051", "CSAFPID-0052", "CSAFPID-0087", "CSAFPID-0088", "CSAFPID-0089", "CSAFPID-0090", "CSAFPID-0091", "CSAFPID-0092", "CSAFPID-0093", "CSAFPID-0094", "CSAFPID-0053", "CSAFPID-0054", "CSAFPID-0055", "CSAFPID-0056", "CSAFPID-0057", "CSAFPID-0058", "CSAFPID-0059", "CSAFPID-0060", "CSAFPID-0061", "CSAFPID-0062", "CSAFPID-0063", "CSAFPID-0064", "CSAFPID-0065", "CSAFPID-0066", "CSAFPID-0067", "CSAFPID-0068", "CSAFPID-0069", "CSAFPID-0070", "CSAFPID-0071", "CSAFPID-0072", "CSAFPID-0073", "CSAFPID-0074", "CSAFPID-0075", "CSAFPID-0076", "CSAFPID-0077", "CSAFPID-0078", "CSAFPID-0079", "CSAFPID-0080", "CSAFPID-0103", "CSAFPID-0104", "CSAFPID-0105", "CSAFPID-0106", "CSAFPID-0107", "CSAFPID-0108", "CSAFPID-0109", "CSAFPID-0110", "CSAFPID-0111", "CSAFPID-0112", "CSAFPID-0113", "CSAFPID-0114", "CSAFPID-0115", "CSAFPID-0116", "CSAFPID-0117", "CSAFPID-0118", "CSAFPID-0119", "CSAFPID-0120", "CSAFPID-0121", "CSAFPID-0122", "CSAFPID-0123", "CSAFPID-0124", "CSAFPID-0125", "CSAFPID-0126", "CSAFPID-0127", "CSAFPID-0128", "CSAFPID-0095", "CSAFPID-0096", "CSAFPID-0097", "CSAFPID-0098", "CSAFPID-0099", "CSAFPID-0100", "CSAFPID-0101", "CSAFPID-0102", "CSAFPID-0129", "CSAFPID-0130", "CSAFPID-0133", "CSAFPID-0134", "CSAFPID-0131", "CSAFPID-0132", "CSAFPID-0135", "CSAFPID-0136", "CSAFPID-0137", "CSAFPID-0138", "CSAFPID-0139", "CSAFPID-0140", "CSAFPID-0141", "CSAFPID-0143", "CSAFPID-0142", "CSAFPID-0144", "CSAFPID-0145", "CSAFPID-0146", "CSAFPID-0147", "CSAFPID-0148", "CSAFPID-0149", "CSAFPID-0150", "CSAFPID-0151", "CSAFPID-0152", "CSAFPID-0153", "CSAFPID-0154", "CSAFPID-0155", "CSAFPID-0156", "CSAFPID-0157", "CSAFPID-0158", "CSAFPID-0159", "CSAFPID-0160", "CSAFPID-0161", "CSAFPID-0162", "CSAFPID-0163", "CSAFPID-0164", "CSAFPID-0214", "CSAFPID-0215", "CSAFPID-0216", "CSAFPID-0217", "CSAFPID-0218", "CSAFPID-0219", "CSAFPID-0165", "CSAFPID-0166", "CSAFPID-0167", "CSAFPID-0168", "CSAFPID-0169", "CSAFPID-0170", "CSAFPID-0171", "CSAFPID-0172", "CSAFPID-0173", "CSAFPID-0174", "CSAFPID-0175", "CSAFPID-0176", "CSAFPID-0177", "CSAFPID-0178", "CSAFPID-0179", "CSAFPID-0180", "CSAFPID-0181", "CSAFPID-0182", "CSAFPID-0183", "CSAFPID-0184", "CSAFPID-0185", "CSAFPID-0186", "CSAFPID-0187", "CSAFPID-0188", "CSAFPID-0189", "CSAFPID-0190", "CSAFPID-0191", "CSAFPID-0192", "CSAFPID-0193", "CSAFPID-0194", "CSAFPID-0195", "CSAFPID-0196", "CSAFPID-0197", "CSAFPID-0198", "CSAFPID-0199", "CSAFPID-0200", "CSAFPID-0201", "CSAFPID-0202", "CSAFPID-0203", "CSAFPID-0204", "CSAFPID-0205", "CSAFPID-0206", "CSAFPID-0207", "CSAFPID-0208", "CSAFPID-0209", "CSAFPID-0210", "CSAFPID-0211", "CSAFPID-0212", "CSAFPID-0213", "CSAFPID-0220", "CSAFPID-0221", "CSAFPID-0222", "CSAFPID-0223", "CSAFPID-0224", "CSAFPID-0225", "CSAFPID-0226", "CSAFPID-0227", "CSAFPID-0228", "CSAFPID-0229", "CSAFPID-0230", "CSAFPID-0231", "CSAFPID-0232", "CSAFPID-0233", "CSAFPID-0234", "CSAFPID-0235", "CSAFPID-0243", "CSAFPID-0242", "CSAFPID-0241", "CSAFPID-0240", "CSAFPID-0239", "CSAFPID-0238", "CSAFPID-0237", "CSAFPID-0236", "CSAFPID-0244", "CSAFPID-0245", "CSAFPID-0253", "CSAFPID-0252", "CSAFPID-0251", "CSAFPID-0250", "CSAFPID-0249", "CSAFPID-0248", "CSAFPID-0247", "CSAFPID-0246", "CSAFPID-0254", "CSAFPID-0255", "CSAFPID-0256", "CSAFPID-0257", "CSAFPID-0258", "CSAFPID-0259", "CSAFPID-0260", "CSAFPID-0261", "CSAFPID-0262", "CSAFPID-0263", "CSAFPID-0264", "CSAFPID-0265", "CSAFPID-0266", "CSAFPID-0267", "CSAFPID-0268", "CSAFPID-0269", "CSAFPID-0270", "CSAFPID-0271", "CSAFPID-0272", "CSAFPID-0273", "CSAFPID-0274", "CSAFPID-0275", "CSAFPID-0276", "CSAFPID-0277", "CSAFPID-0278", "CSAFPID-0279", "CSAFPID-0280", "CSAFPID-0281", "CSAFPID-0282", "CSAFPID-0283", "CSAFPID-0284", "CSAFPID-0285", "CSAFPID-0286", "CSAFPID-0287", "CSAFPID-0288", "CSAFPID-0289", "CSAFPID-0290", "CSAFPID-0291", "CSAFPID-0292", "CSAFPID-0293", "CSAFPID-0294", "CSAFPID-0295", "CSAFPID-0296", "CSAFPID-0297", "CSAFPID-0298", "CSAFPID-0299", "CSAFPID-0300", "CSAFPID-0301", "CSAFPID-0302", "CSAFPID-0303", "CSAFPID-0304", "CSAFPID-0305", "CSAFPID-0306", "CSAFPID-0307", "CSAFPID-0308", "CSAFPID-0309", "CSAFPID-0310", "CSAFPID-0311", "CSAFPID-0312", "CSAFPID-0313", "CSAFPID-0314", "CSAFPID-0315", "CSAFPID-0316", "CSAFPID-0317", "CSAFPID-0318", "CSAFPID-0319", "CSAFPID-0320", "CSAFPID-0321", "CSAFPID-0322", "CSAFPID-0323", "CSAFPID-0324", "CSAFPID-0325", "CSAFPID-0326", "CSAFPID-0327", "CSAFPID-0328", "CSAFPID-0329", "CSAFPID-0330", "CSAFPID-0331", "CSAFPID-0332", "CSAFPID-0333", "CSAFPID-0334", "CSAFPID-0335", "CSAFPID-0336", "CSAFPID-0337", "CSAFPID-0338", "CSAFPID-0339", "CSAFPID-0340", "CSAFPID-0341", "CSAFPID-0342", "CSAFPID-0343", "CSAFPID-0344", "CSAFPID-0345", "CSAFPID-0376", "CSAFPID-0377", "CSAFPID-0378", "CSAFPID-0379", "CSAFPID-0372", "CSAFPID-0373", "CSAFPID-0374", "CSAFPID-0375", "CSAFPID-0380", "CSAFPID-0381", "CSAFPID-0358", "CSAFPID-0359", "CSAFPID-0360", "CSAFPID-0361", "CSAFPID-0354", "CSAFPID-0355", "CSAFPID-0356", "CSAFPID-0357", "CSAFPID-0350", "CSAFPID-0351", "CSAFPID-0352", "CSAFPID-0353", "CSAFPID-0346", "CSAFPID-0347", "CSAFPID-0348", "CSAFPID-0349", "CSAFPID-0366", "CSAFPID-0367", "CSAFPID-0368", "CSAFPID-0369", "CSAFPID-0362", "CSAFPID-0363", "CSAFPID-0364", "CSAFPID-0365", "CSAFPID-0370", "CSAFPID-0371", "CSAFPID-0382", "CSAFPID-0383", "CSAFPID-0384", "CSAFPID-0385", "CSAFPID-0388", "CSAFPID-0389", "CSAFPID-0386", "CSAFPID-0387", "CSAFPID-0390", "CSAFPID-0391", "CSAFPID-0392", "CSAFPID-0393", "CSAFPID-0396", "CSAFPID-0397", "CSAFPID-0394", "CSAFPID-0395", "CSAFPID-0398", "CSAFPID-0399", "CSAFPID-0402", "CSAFPID-0403", "CSAFPID-0400", "CSAFPID-0401", "CSAFPID-0406", "CSAFPID-0405", "CSAFPID-0404", "CSAFPID-0407", "CSAFPID-0411", "CSAFPID-0410", "CSAFPID-0408", "CSAFPID-0409", "CSAFPID-0412", "CSAFPID-0418", "CSAFPID-0417", "CSAFPID-0416", "CSAFPID-0415", "CSAFPID-0414", "CSAFPID-0413", "CSAFPID-0419", "CSAFPID-0420", "CSAFPID-0421", "CSAFPID-0422", "CSAFPID-0423", "CSAFPID-0424" ] }, "remediations": [ { "category": "mitigation", "details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0081", "CSAFPID-0082", "CSAFPID-0083", "CSAFPID-0084", "CSAFPID-0085", "CSAFPID-0086", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041", "CSAFPID-0042", "CSAFPID-0043", "CSAFPID-0044", "CSAFPID-0045", "CSAFPID-0046", "CSAFPID-0047", "CSAFPID-0048", "CSAFPID-0049", "CSAFPID-0050", "CSAFPID-0051", "CSAFPID-0052", "CSAFPID-0087", "CSAFPID-0088", "CSAFPID-0089", "CSAFPID-0090", "CSAFPID-0091", "CSAFPID-0092", "CSAFPID-0093", "CSAFPID-0094", "CSAFPID-0053", "CSAFPID-0054", "CSAFPID-0055", "CSAFPID-0056", "CSAFPID-0057", "CSAFPID-0058", "CSAFPID-0059", "CSAFPID-0060", "CSAFPID-0061", "CSAFPID-0062", "CSAFPID-0063", "CSAFPID-0064", "CSAFPID-0065", "CSAFPID-0066", "CSAFPID-0067", "CSAFPID-0068", "CSAFPID-0069", "CSAFPID-0070", "CSAFPID-0071", "CSAFPID-0072", "CSAFPID-0073", "CSAFPID-0074", "CSAFPID-0075", "CSAFPID-0076", "CSAFPID-0077", "CSAFPID-0078", "CSAFPID-0079", "CSAFPID-0080", "CSAFPID-0103", "CSAFPID-0104", "CSAFPID-0105", "CSAFPID-0106", "CSAFPID-0107", "CSAFPID-0108", "CSAFPID-0109", "CSAFPID-0110", "CSAFPID-0111", "CSAFPID-0112", "CSAFPID-0113", "CSAFPID-0114", "CSAFPID-0115", "CSAFPID-0116", "CSAFPID-0117", "CSAFPID-0118", "CSAFPID-0119", "CSAFPID-0120", "CSAFPID-0121", "CSAFPID-0122", "CSAFPID-0123", "CSAFPID-0124", "CSAFPID-0125", "CSAFPID-0126", "CSAFPID-0127", "CSAFPID-0128", "CSAFPID-0095", "CSAFPID-0096", "CSAFPID-0097", "CSAFPID-0098", "CSAFPID-0099", "CSAFPID-0100", "CSAFPID-0101", "CSAFPID-0102", "CSAFPID-0129", "CSAFPID-0130", "CSAFPID-0133", "CSAFPID-0134", "CSAFPID-0131", "CSAFPID-0132", "CSAFPID-0135", "CSAFPID-0136", "CSAFPID-0137", "CSAFPID-0138", "CSAFPID-0139", "CSAFPID-0140", "CSAFPID-0141", "CSAFPID-0143", "CSAFPID-0142", "CSAFPID-0144", "CSAFPID-0145", "CSAFPID-0146", "CSAFPID-0147", "CSAFPID-0148", "CSAFPID-0149", "CSAFPID-0150", "CSAFPID-0151", "CSAFPID-0152", "CSAFPID-0153", "CSAFPID-0154", "CSAFPID-0155", "CSAFPID-0156", "CSAFPID-0157", "CSAFPID-0158", "CSAFPID-0159", "CSAFPID-0160", "CSAFPID-0161", "CSAFPID-0162", "CSAFPID-0163", "CSAFPID-0164", "CSAFPID-0214", "CSAFPID-0215", "CSAFPID-0216", "CSAFPID-0217", "CSAFPID-0218", "CSAFPID-0219", "CSAFPID-0165", "CSAFPID-0166", "CSAFPID-0167", "CSAFPID-0168", "CSAFPID-0169", "CSAFPID-0170", "CSAFPID-0171", "CSAFPID-0172", "CSAFPID-0173", "CSAFPID-0174", "CSAFPID-0175", "CSAFPID-0176", "CSAFPID-0177", "CSAFPID-0178", "CSAFPID-0179", "CSAFPID-0180", "CSAFPID-0181", "CSAFPID-0182", "CSAFPID-0183", "CSAFPID-0184", "CSAFPID-0185", "CSAFPID-0186", "CSAFPID-0187", "CSAFPID-0188", "CSAFPID-0189", "CSAFPID-0190", "CSAFPID-0191", "CSAFPID-0192", "CSAFPID-0193", "CSAFPID-0194", "CSAFPID-0195", "CSAFPID-0196", "CSAFPID-0197", "CSAFPID-0198", "CSAFPID-0199", "CSAFPID-0200", "CSAFPID-0201", "CSAFPID-0202", "CSAFPID-0203", "CSAFPID-0204", "CSAFPID-0205", "CSAFPID-0206", "CSAFPID-0207", "CSAFPID-0208", "CSAFPID-0209", "CSAFPID-0210", "CSAFPID-0211", "CSAFPID-0212", "CSAFPID-0213", "CSAFPID-0220", "CSAFPID-0221", "CSAFPID-0222", "CSAFPID-0223", "CSAFPID-0224", "CSAFPID-0225", "CSAFPID-0226", "CSAFPID-0227", "CSAFPID-0228", "CSAFPID-0229", "CSAFPID-0230", "CSAFPID-0231", "CSAFPID-0232", "CSAFPID-0233", "CSAFPID-0234", "CSAFPID-0235", "CSAFPID-0243", "CSAFPID-0242", "CSAFPID-0241", "CSAFPID-0240", "CSAFPID-0239", "CSAFPID-0238", "CSAFPID-0237", "CSAFPID-0236", "CSAFPID-0244", "CSAFPID-0245", "CSAFPID-0253", "CSAFPID-0252", "CSAFPID-0251", "CSAFPID-0250", "CSAFPID-0249", "CSAFPID-0248", "CSAFPID-0247", "CSAFPID-0246", "CSAFPID-0254", "CSAFPID-0255", "CSAFPID-0256", "CSAFPID-0257", "CSAFPID-0258", "CSAFPID-0259", "CSAFPID-0260", "CSAFPID-0261", "CSAFPID-0262", "CSAFPID-0263", "CSAFPID-0264", "CSAFPID-0265", "CSAFPID-0266", "CSAFPID-0267", "CSAFPID-0268", "CSAFPID-0269", "CSAFPID-0270", "CSAFPID-0271", "CSAFPID-0272", "CSAFPID-0273", "CSAFPID-0274", "CSAFPID-0275", "CSAFPID-0276", "CSAFPID-0277", "CSAFPID-0278", "CSAFPID-0279", "CSAFPID-0280", "CSAFPID-0281", "CSAFPID-0282", "CSAFPID-0283", "CSAFPID-0284", "CSAFPID-0285", "CSAFPID-0286", "CSAFPID-0287", "CSAFPID-0288", "CSAFPID-0289", "CSAFPID-0290", "CSAFPID-0291", "CSAFPID-0292", "CSAFPID-0293", "CSAFPID-0294", "CSAFPID-0295", "CSAFPID-0296", "CSAFPID-0297", "CSAFPID-0298", "CSAFPID-0299", "CSAFPID-0300", "CSAFPID-0301", "CSAFPID-0302", "CSAFPID-0303", "CSAFPID-0304", "CSAFPID-0305", "CSAFPID-0306", "CSAFPID-0307", "CSAFPID-0308", "CSAFPID-0309", "CSAFPID-0310", "CSAFPID-0311", "CSAFPID-0312", "CSAFPID-0313", "CSAFPID-0314", "CSAFPID-0315", "CSAFPID-0316", "CSAFPID-0317", "CSAFPID-0318", "CSAFPID-0319", "CSAFPID-0320", "CSAFPID-0321", "CSAFPID-0322", "CSAFPID-0323", "CSAFPID-0324", "CSAFPID-0325", "CSAFPID-0326", "CSAFPID-0327", "CSAFPID-0328", "CSAFPID-0329", "CSAFPID-0330", "CSAFPID-0331", "CSAFPID-0332", "CSAFPID-0333", "CSAFPID-0334", "CSAFPID-0335", "CSAFPID-0336", "CSAFPID-0337", "CSAFPID-0338", "CSAFPID-0339", "CSAFPID-0340", "CSAFPID-0341", "CSAFPID-0342", "CSAFPID-0343", "CSAFPID-0344", "CSAFPID-0345", "CSAFPID-0376", "CSAFPID-0377", "CSAFPID-0378", "CSAFPID-0379", "CSAFPID-0372", "CSAFPID-0373", "CSAFPID-0374", "CSAFPID-0375", "CSAFPID-0380", "CSAFPID-0381", "CSAFPID-0358", "CSAFPID-0359", "CSAFPID-0360", "CSAFPID-0361", "CSAFPID-0354", "CSAFPID-0355", "CSAFPID-0356", "CSAFPID-0357", "CSAFPID-0350", "CSAFPID-0351", "CSAFPID-0352", "CSAFPID-0353", "CSAFPID-0346", "CSAFPID-0347", "CSAFPID-0348", "CSAFPID-0349", "CSAFPID-0366", "CSAFPID-0367", "CSAFPID-0368", "CSAFPID-0369", "CSAFPID-0362", "CSAFPID-0363", "CSAFPID-0364", "CSAFPID-0365", "CSAFPID-0370", "CSAFPID-0371", "CSAFPID-0382", "CSAFPID-0383", "CSAFPID-0384", "CSAFPID-0385", "CSAFPID-0388", "CSAFPID-0389", "CSAFPID-0386", "CSAFPID-0387", "CSAFPID-0390", "CSAFPID-0391", "CSAFPID-0392", "CSAFPID-0393", "CSAFPID-0396", "CSAFPID-0397", "CSAFPID-0394", "CSAFPID-0395", "CSAFPID-0398", "CSAFPID-0399", "CSAFPID-0402", "CSAFPID-0403", "CSAFPID-0400", "CSAFPID-0401", "CSAFPID-0406", "CSAFPID-0405", "CSAFPID-0404", "CSAFPID-0407", "CSAFPID-0411", "CSAFPID-0410", "CSAFPID-0408", "CSAFPID-0409", "CSAFPID-0412", "CSAFPID-0418", "CSAFPID-0417", "CSAFPID-0416", "CSAFPID-0415", "CSAFPID-0414", "CSAFPID-0413", "CSAFPID-0419", "CSAFPID-0420", "CSAFPID-0421", "CSAFPID-0422", "CSAFPID-0423", "CSAFPID-0424" ] }, { "category": "mitigation", "details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0081", "CSAFPID-0082", "CSAFPID-0083", "CSAFPID-0084", "CSAFPID-0085", "CSAFPID-0086", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041", "CSAFPID-0042", "CSAFPID-0043", "CSAFPID-0044", "CSAFPID-0045", "CSAFPID-0046", "CSAFPID-0047", "CSAFPID-0048", "CSAFPID-0049", "CSAFPID-0050", "CSAFPID-0051", "CSAFPID-0052", "CSAFPID-0087", "CSAFPID-0088", "CSAFPID-0089", "CSAFPID-0090", "CSAFPID-0091", "CSAFPID-0092", "CSAFPID-0093", "CSAFPID-0094", "CSAFPID-0053", "CSAFPID-0054", "CSAFPID-0055", "CSAFPID-0056", "CSAFPID-0057", "CSAFPID-0058", "CSAFPID-0059", "CSAFPID-0060", "CSAFPID-0061", "CSAFPID-0062", "CSAFPID-0063", "CSAFPID-0064", "CSAFPID-0065", "CSAFPID-0066", "CSAFPID-0067", "CSAFPID-0068", "CSAFPID-0069", "CSAFPID-0070", "CSAFPID-0071", "CSAFPID-0072", "CSAFPID-0073", "CSAFPID-0074", "CSAFPID-0075", "CSAFPID-0076", "CSAFPID-0077", "CSAFPID-0078", "CSAFPID-0079", "CSAFPID-0080", "CSAFPID-0103", "CSAFPID-0104", "CSAFPID-0105", "CSAFPID-0106", "CSAFPID-0107", "CSAFPID-0108", "CSAFPID-0109", "CSAFPID-0110", "CSAFPID-0111", "CSAFPID-0112", "CSAFPID-0113", "CSAFPID-0114", "CSAFPID-0115", "CSAFPID-0116", "CSAFPID-0117", "CSAFPID-0118", "CSAFPID-0119", "CSAFPID-0120", "CSAFPID-0121", "CSAFPID-0122", "CSAFPID-0123", "CSAFPID-0124", "CSAFPID-0125", "CSAFPID-0126", "CSAFPID-0127", "CSAFPID-0128", "CSAFPID-0095", "CSAFPID-0096", "CSAFPID-0097", "CSAFPID-0098", "CSAFPID-0099", "CSAFPID-0100", "CSAFPID-0101", "CSAFPID-0102", "CSAFPID-0129", "CSAFPID-0130", "CSAFPID-0133", "CSAFPID-0134", "CSAFPID-0131", "CSAFPID-0132", "CSAFPID-0135", "CSAFPID-0136", "CSAFPID-0137", "CSAFPID-0138", "CSAFPID-0139", "CSAFPID-0140", "CSAFPID-0141", "CSAFPID-0143", "CSAFPID-0142", "CSAFPID-0144", "CSAFPID-0145", "CSAFPID-0146", "CSAFPID-0147", "CSAFPID-0148", "CSAFPID-0149", "CSAFPID-0150", "CSAFPID-0151", "CSAFPID-0152", "CSAFPID-0153", "CSAFPID-0154", "CSAFPID-0155", "CSAFPID-0156", "CSAFPID-0157", "CSAFPID-0158", "CSAFPID-0159", "CSAFPID-0160", "CSAFPID-0161", "CSAFPID-0162", "CSAFPID-0163", "CSAFPID-0164", "CSAFPID-0214", "CSAFPID-0215", "CSAFPID-0216", "CSAFPID-0217", "CSAFPID-0218", "CSAFPID-0219", "CSAFPID-0165", "CSAFPID-0166", "CSAFPID-0167", "CSAFPID-0168", "CSAFPID-0169", "CSAFPID-0170", "CSAFPID-0171", "CSAFPID-0172", "CSAFPID-0173", "CSAFPID-0174", "CSAFPID-0175", "CSAFPID-0176", "CSAFPID-0177", "CSAFPID-0178", "CSAFPID-0179", "CSAFPID-0180", "CSAFPID-0181", "CSAFPID-0182", "CSAFPID-0183", "CSAFPID-0184", "CSAFPID-0185", "CSAFPID-0186", "CSAFPID-0187", "CSAFPID-0188", "CSAFPID-0189", "CSAFPID-0190", "CSAFPID-0191", "CSAFPID-0192", "CSAFPID-0193", "CSAFPID-0194", "CSAFPID-0195", "CSAFPID-0196", "CSAFPID-0197", "CSAFPID-0198", "CSAFPID-0199", "CSAFPID-0200", "CSAFPID-0201", "CSAFPID-0202", "CSAFPID-0203", "CSAFPID-0204", "CSAFPID-0205", "CSAFPID-0206", "CSAFPID-0207", "CSAFPID-0208", "CSAFPID-0209", "CSAFPID-0210", "CSAFPID-0211", "CSAFPID-0212", "CSAFPID-0213", "CSAFPID-0220", "CSAFPID-0221", "CSAFPID-0222", "CSAFPID-0223", "CSAFPID-0224", "CSAFPID-0225", "CSAFPID-0226", "CSAFPID-0227", "CSAFPID-0228", "CSAFPID-0229", "CSAFPID-0230", "CSAFPID-0231", "CSAFPID-0232", "CSAFPID-0233", "CSAFPID-0234", "CSAFPID-0235", "CSAFPID-0243", "CSAFPID-0242", "CSAFPID-0241", "CSAFPID-0240", "CSAFPID-0239", "CSAFPID-0238", "CSAFPID-0237", "CSAFPID-0236", "CSAFPID-0244", "CSAFPID-0245", "CSAFPID-0253", "CSAFPID-0252", "CSAFPID-0251", "CSAFPID-0250", "CSAFPID-0249", "CSAFPID-0248", "CSAFPID-0247", "CSAFPID-0246", "CSAFPID-0254", "CSAFPID-0255", "CSAFPID-0256", "CSAFPID-0257", "CSAFPID-0258", "CSAFPID-0259", "CSAFPID-0260", "CSAFPID-0261", "CSAFPID-0262", "CSAFPID-0263", "CSAFPID-0264", "CSAFPID-0265", "CSAFPID-0266", "CSAFPID-0267", "CSAFPID-0268", "CSAFPID-0269", "CSAFPID-0270", "CSAFPID-0271", "CSAFPID-0272", "CSAFPID-0273", "CSAFPID-0274", "CSAFPID-0275", "CSAFPID-0276", "CSAFPID-0277", "CSAFPID-0278", "CSAFPID-0279", "CSAFPID-0280", "CSAFPID-0281", "CSAFPID-0282", "CSAFPID-0283", "CSAFPID-0284", "CSAFPID-0285", "CSAFPID-0286", "CSAFPID-0287", "CSAFPID-0288", "CSAFPID-0289", "CSAFPID-0290", "CSAFPID-0291", "CSAFPID-0292", "CSAFPID-0293", "CSAFPID-0294", "CSAFPID-0295", "CSAFPID-0296", "CSAFPID-0297", "CSAFPID-0298", "CSAFPID-0299", "CSAFPID-0300", "CSAFPID-0301", "CSAFPID-0302", "CSAFPID-0303", "CSAFPID-0304", "CSAFPID-0305", "CSAFPID-0306", "CSAFPID-0307", "CSAFPID-0308", "CSAFPID-0309", "CSAFPID-0310", "CSAFPID-0311", "CSAFPID-0312", "CSAFPID-0313", "CSAFPID-0314", "CSAFPID-0315", "CSAFPID-0316", "CSAFPID-0317", "CSAFPID-0318", "CSAFPID-0319", "CSAFPID-0320", "CSAFPID-0321", "CSAFPID-0322", "CSAFPID-0323", "CSAFPID-0324", "CSAFPID-0325", "CSAFPID-0326", "CSAFPID-0327", "CSAFPID-0328", "CSAFPID-0329", "CSAFPID-0330", "CSAFPID-0331", "CSAFPID-0332", "CSAFPID-0333", "CSAFPID-0334", "CSAFPID-0335", "CSAFPID-0336", "CSAFPID-0337", "CSAFPID-0338", "CSAFPID-0339", "CSAFPID-0340", "CSAFPID-0341", "CSAFPID-0342", "CSAFPID-0343", "CSAFPID-0344", "CSAFPID-0345", "CSAFPID-0376", "CSAFPID-0377", "CSAFPID-0378", "CSAFPID-0379", "CSAFPID-0372", "CSAFPID-0373", "CSAFPID-0374", "CSAFPID-0375", "CSAFPID-0380", "CSAFPID-0381", "CSAFPID-0358", "CSAFPID-0359", "CSAFPID-0360", "CSAFPID-0361", "CSAFPID-0354", "CSAFPID-0355", "CSAFPID-0356", "CSAFPID-0357", "CSAFPID-0350", "CSAFPID-0351", "CSAFPID-0352", "CSAFPID-0353", "CSAFPID-0346", "CSAFPID-0347", "CSAFPID-0348", "CSAFPID-0349", "CSAFPID-0366", "CSAFPID-0367", "CSAFPID-0368", "CSAFPID-0369", "CSAFPID-0362", "CSAFPID-0363", "CSAFPID-0364", "CSAFPID-0365", "CSAFPID-0370", "CSAFPID-0371", "CSAFPID-0382", "CSAFPID-0383", "CSAFPID-0384", "CSAFPID-0385", "CSAFPID-0388", "CSAFPID-0389", "CSAFPID-0386", "CSAFPID-0387", "CSAFPID-0390", "CSAFPID-0391", "CSAFPID-0392", "CSAFPID-0393", "CSAFPID-0396", "CSAFPID-0397", "CSAFPID-0394", "CSAFPID-0395", "CSAFPID-0398", "CSAFPID-0399", "CSAFPID-0402", "CSAFPID-0403", "CSAFPID-0400", "CSAFPID-0401", "CSAFPID-0406", "CSAFPID-0405", "CSAFPID-0404", "CSAFPID-0407", "CSAFPID-0411", "CSAFPID-0410", "CSAFPID-0408", "CSAFPID-0409", "CSAFPID-0412", "CSAFPID-0418", "CSAFPID-0417", "CSAFPID-0416", "CSAFPID-0415", "CSAFPID-0414", "CSAFPID-0413", "CSAFPID-0419", "CSAFPID-0420", "CSAFPID-0421", "CSAFPID-0422", "CSAFPID-0423", "CSAFPID-0424" ] }, { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0419" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0081", "CSAFPID-0082", "CSAFPID-0083", "CSAFPID-0084", "CSAFPID-0085", "CSAFPID-0086", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041", "CSAFPID-0042", "CSAFPID-0043", "CSAFPID-0044", "CSAFPID-0045", "CSAFPID-0046", "CSAFPID-0047", "CSAFPID-0048", "CSAFPID-0049", "CSAFPID-0050", "CSAFPID-0051", "CSAFPID-0052", "CSAFPID-0087", "CSAFPID-0088", "CSAFPID-0089", "CSAFPID-0090", "CSAFPID-0091", "CSAFPID-0092", "CSAFPID-0093", "CSAFPID-0094", "CSAFPID-0053", "CSAFPID-0054", "CSAFPID-0055", "CSAFPID-0056", "CSAFPID-0057", "CSAFPID-0058", "CSAFPID-0059", "CSAFPID-0060", "CSAFPID-0061", "CSAFPID-0062", "CSAFPID-0063", "CSAFPID-0064", "CSAFPID-0065", "CSAFPID-0066", "CSAFPID-0067", "CSAFPID-0068", "CSAFPID-0069", "CSAFPID-0070", "CSAFPID-0071", "CSAFPID-0072", "CSAFPID-0073", "CSAFPID-0074", "CSAFPID-0075", "CSAFPID-0076", "CSAFPID-0077", "CSAFPID-0078", "CSAFPID-0079", "CSAFPID-0080", "CSAFPID-0103", "CSAFPID-0104", "CSAFPID-0105", "CSAFPID-0106", "CSAFPID-0107", "CSAFPID-0108", "CSAFPID-0109", "CSAFPID-0110", "CSAFPID-0111", "CSAFPID-0112", "CSAFPID-0113", "CSAFPID-0114", "CSAFPID-0115", "CSAFPID-0116", "CSAFPID-0117", "CSAFPID-0118", "CSAFPID-0119", "CSAFPID-0120", "CSAFPID-0121", "CSAFPID-0122", "CSAFPID-0123", "CSAFPID-0124", "CSAFPID-0125", "CSAFPID-0126", "CSAFPID-0127", "CSAFPID-0128", "CSAFPID-0095", "CSAFPID-0096", "CSAFPID-0097", "CSAFPID-0098", "CSAFPID-0099", "CSAFPID-0100", "CSAFPID-0101", "CSAFPID-0102", "CSAFPID-0129", "CSAFPID-0130", "CSAFPID-0133", "CSAFPID-0134", "CSAFPID-0131", "CSAFPID-0132", "CSAFPID-0135", "CSAFPID-0136", "CSAFPID-0137", "CSAFPID-0138", "CSAFPID-0139", "CSAFPID-0140", "CSAFPID-0141", "CSAFPID-0143", "CSAFPID-0142", "CSAFPID-0144", "CSAFPID-0145", "CSAFPID-0146", "CSAFPID-0147", "CSAFPID-0148", "CSAFPID-0149", "CSAFPID-0150", "CSAFPID-0151", "CSAFPID-0152", "CSAFPID-0153", "CSAFPID-0154", "CSAFPID-0155", "CSAFPID-0156", "CSAFPID-0157", "CSAFPID-0158", "CSAFPID-0159", "CSAFPID-0160", "CSAFPID-0161", "CSAFPID-0162", "CSAFPID-0163", "CSAFPID-0164", "CSAFPID-0214", "CSAFPID-0215", "CSAFPID-0216", "CSAFPID-0217", "CSAFPID-0218", "CSAFPID-0219", "CSAFPID-0165", "CSAFPID-0166", "CSAFPID-0167", "CSAFPID-0168", "CSAFPID-0169", "CSAFPID-0170", "CSAFPID-0171", "CSAFPID-0172", "CSAFPID-0173", "CSAFPID-0174", "CSAFPID-0175", "CSAFPID-0176", "CSAFPID-0177", "CSAFPID-0178", "CSAFPID-0179", "CSAFPID-0180", "CSAFPID-0181", "CSAFPID-0182", "CSAFPID-0183", "CSAFPID-0184", "CSAFPID-0185", "CSAFPID-0186", "CSAFPID-0187", "CSAFPID-0188", "CSAFPID-0189", "CSAFPID-0190", "CSAFPID-0191", "CSAFPID-0192", "CSAFPID-0193", "CSAFPID-0194", "CSAFPID-0195", "CSAFPID-0196", "CSAFPID-0197", "CSAFPID-0198", "CSAFPID-0199", "CSAFPID-0200", "CSAFPID-0201", "CSAFPID-0202", "CSAFPID-0203", "CSAFPID-0204", "CSAFPID-0205", "CSAFPID-0206", "CSAFPID-0207", "CSAFPID-0208", "CSAFPID-0209", "CSAFPID-0210", "CSAFPID-0211", "CSAFPID-0212", "CSAFPID-0213", "CSAFPID-0220", "CSAFPID-0221", "CSAFPID-0222", "CSAFPID-0223", "CSAFPID-0224", "CSAFPID-0225", "CSAFPID-0226", "CSAFPID-0227", "CSAFPID-0228", "CSAFPID-0229", "CSAFPID-0230", "CSAFPID-0231", "CSAFPID-0232", "CSAFPID-0233", "CSAFPID-0234", "CSAFPID-0235", "CSAFPID-0243", "CSAFPID-0242", "CSAFPID-0241", "CSAFPID-0240", "CSAFPID-0239", "CSAFPID-0238", "CSAFPID-0237", "CSAFPID-0236", "CSAFPID-0244", "CSAFPID-0245", "CSAFPID-0253", "CSAFPID-0252", "CSAFPID-0251", "CSAFPID-0250", "CSAFPID-0249", "CSAFPID-0248", "CSAFPID-0247", "CSAFPID-0246", "CSAFPID-0254", "CSAFPID-0255", "CSAFPID-0256", "CSAFPID-0257", "CSAFPID-0258", "CSAFPID-0259", "CSAFPID-0260", "CSAFPID-0261", "CSAFPID-0262", "CSAFPID-0263", "CSAFPID-0264", "CSAFPID-0265", "CSAFPID-0266", "CSAFPID-0267", "CSAFPID-0268", "CSAFPID-0269", "CSAFPID-0270", "CSAFPID-0271", "CSAFPID-0272", "CSAFPID-0273", "CSAFPID-0274", "CSAFPID-0275", "CSAFPID-0276", "CSAFPID-0277", "CSAFPID-0278", "CSAFPID-0279", "CSAFPID-0280", "CSAFPID-0281", "CSAFPID-0282", "CSAFPID-0283", "CSAFPID-0284", "CSAFPID-0285", "CSAFPID-0286", "CSAFPID-0287", "CSAFPID-0288", "CSAFPID-0289", "CSAFPID-0290", "CSAFPID-0291", "CSAFPID-0292", "CSAFPID-0293", "CSAFPID-0294", "CSAFPID-0295", "CSAFPID-0296", "CSAFPID-0297", "CSAFPID-0298", "CSAFPID-0299", "CSAFPID-0300", "CSAFPID-0301", "CSAFPID-0302", "CSAFPID-0303", "CSAFPID-0304", "CSAFPID-0305", "CSAFPID-0306", "CSAFPID-0307", "CSAFPID-0308", "CSAFPID-0309", "CSAFPID-0310", "CSAFPID-0311", "CSAFPID-0312", "CSAFPID-0313", "CSAFPID-0314", "CSAFPID-0315", "CSAFPID-0316", "CSAFPID-0317", "CSAFPID-0318", "CSAFPID-0319", "CSAFPID-0320", "CSAFPID-0321", "CSAFPID-0322", "CSAFPID-0323", "CSAFPID-0324", "CSAFPID-0325", "CSAFPID-0326", "CSAFPID-0327", "CSAFPID-0328", "CSAFPID-0329", "CSAFPID-0330", "CSAFPID-0331", "CSAFPID-0332", "CSAFPID-0333", "CSAFPID-0334", "CSAFPID-0335", "CSAFPID-0336", "CSAFPID-0337", "CSAFPID-0338", "CSAFPID-0339", "CSAFPID-0340", "CSAFPID-0341", "CSAFPID-0342", "CSAFPID-0343", "CSAFPID-0344", "CSAFPID-0345", "CSAFPID-0376", "CSAFPID-0377", "CSAFPID-0378", "CSAFPID-0379", "CSAFPID-0372", "CSAFPID-0373", "CSAFPID-0374", "CSAFPID-0375", "CSAFPID-0380", "CSAFPID-0381", "CSAFPID-0358", "CSAFPID-0359", "CSAFPID-0360", "CSAFPID-0361", "CSAFPID-0354", "CSAFPID-0355", "CSAFPID-0356", "CSAFPID-0357", "CSAFPID-0350", "CSAFPID-0351", "CSAFPID-0352", "CSAFPID-0353", "CSAFPID-0346", "CSAFPID-0347", "CSAFPID-0348", "CSAFPID-0349", "CSAFPID-0366", "CSAFPID-0367", "CSAFPID-0368", "CSAFPID-0369", "CSAFPID-0362", "CSAFPID-0363", "CSAFPID-0364", "CSAFPID-0365", "CSAFPID-0370", "CSAFPID-0371", "CSAFPID-0382", "CSAFPID-0383", "CSAFPID-0384", "CSAFPID-0385", "CSAFPID-0388", "CSAFPID-0389", "CSAFPID-0386", "CSAFPID-0387", "CSAFPID-0390", "CSAFPID-0391", "CSAFPID-0392", "CSAFPID-0393", "CSAFPID-0396", "CSAFPID-0397", "CSAFPID-0394", "CSAFPID-0395", "CSAFPID-0398", "CSAFPID-0399", "CSAFPID-0402", "CSAFPID-0403", "CSAFPID-0400", "CSAFPID-0401", "CSAFPID-0406", "CSAFPID-0405", "CSAFPID-0404", "CSAFPID-0407", "CSAFPID-0411", "CSAFPID-0410", "CSAFPID-0408", "CSAFPID-0409", "CSAFPID-0412", "CSAFPID-0418", "CSAFPID-0417", "CSAFPID-0416", "CSAFPID-0415", "CSAFPID-0414", "CSAFPID-0413", "CSAFPID-0420", "CSAFPID-0421", "CSAFPID-0422", "CSAFPID-0423", "CSAFPID-0424" ] }, { "category": "vendor_fix", "details": "Update to V5.6 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109976555/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0081", "CSAFPID-0082", "CSAFPID-0083", "CSAFPID-0084", "CSAFPID-0085", "CSAFPID-0086", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041", "CSAFPID-0042", "CSAFPID-0043", "CSAFPID-0044", "CSAFPID-0045", "CSAFPID-0046", "CSAFPID-0047", "CSAFPID-0048", "CSAFPID-0049", "CSAFPID-0050", "CSAFPID-0051", "CSAFPID-0052", "CSAFPID-0087", "CSAFPID-0088", "CSAFPID-0089", "CSAFPID-0090", "CSAFPID-0091", "CSAFPID-0092", "CSAFPID-0093", "CSAFPID-0094", "CSAFPID-0053", "CSAFPID-0054", "CSAFPID-0055", "CSAFPID-0056", "CSAFPID-0057", "CSAFPID-0058", "CSAFPID-0059", "CSAFPID-0060", "CSAFPID-0061", "CSAFPID-0062", "CSAFPID-0063", "CSAFPID-0064", "CSAFPID-0065", "CSAFPID-0066", "CSAFPID-0067", "CSAFPID-0068", "CSAFPID-0069", "CSAFPID-0070", "CSAFPID-0071", "CSAFPID-0072", "CSAFPID-0073", "CSAFPID-0074", "CSAFPID-0075", "CSAFPID-0076", "CSAFPID-0077", "CSAFPID-0078", "CSAFPID-0079", "CSAFPID-0080", "CSAFPID-0103", "CSAFPID-0104", "CSAFPID-0105", "CSAFPID-0106", "CSAFPID-0107", "CSAFPID-0108", "CSAFPID-0109", "CSAFPID-0110", "CSAFPID-0111", "CSAFPID-0112", "CSAFPID-0113", "CSAFPID-0114", "CSAFPID-0115", "CSAFPID-0116", "CSAFPID-0117", "CSAFPID-0118", "CSAFPID-0119", "CSAFPID-0120", "CSAFPID-0121", "CSAFPID-0122", "CSAFPID-0123", "CSAFPID-0124", "CSAFPID-0125", "CSAFPID-0126", "CSAFPID-0127", "CSAFPID-0128", "CSAFPID-0095", "CSAFPID-0096", "CSAFPID-0097", "CSAFPID-0098", "CSAFPID-0099", "CSAFPID-0100", "CSAFPID-0101", "CSAFPID-0102", "CSAFPID-0129", "CSAFPID-0130", "CSAFPID-0133", "CSAFPID-0134", "CSAFPID-0131", "CSAFPID-0132", "CSAFPID-0135", "CSAFPID-0136", "CSAFPID-0137", "CSAFPID-0138", "CSAFPID-0139", "CSAFPID-0140", "CSAFPID-0141", "CSAFPID-0143", "CSAFPID-0142", "CSAFPID-0144", "CSAFPID-0145", "CSAFPID-0146", "CSAFPID-0147", "CSAFPID-0148", "CSAFPID-0149", "CSAFPID-0150", "CSAFPID-0151", "CSAFPID-0152", "CSAFPID-0153", "CSAFPID-0154", "CSAFPID-0155", "CSAFPID-0156", "CSAFPID-0157", "CSAFPID-0158", "CSAFPID-0159", "CSAFPID-0160", "CSAFPID-0161", "CSAFPID-0162", "CSAFPID-0163", "CSAFPID-0164", "CSAFPID-0214", "CSAFPID-0215", "CSAFPID-0216", "CSAFPID-0217", "CSAFPID-0218", "CSAFPID-0219", "CSAFPID-0165", "CSAFPID-0166", "CSAFPID-0167", "CSAFPID-0168", "CSAFPID-0169", "CSAFPID-0170", "CSAFPID-0171", "CSAFPID-0172", "CSAFPID-0173", "CSAFPID-0174", "CSAFPID-0175", "CSAFPID-0176", "CSAFPID-0177", "CSAFPID-0178", "CSAFPID-0179", "CSAFPID-0180", "CSAFPID-0181", "CSAFPID-0182", "CSAFPID-0183", "CSAFPID-0184", "CSAFPID-0185", "CSAFPID-0186", "CSAFPID-0187", "CSAFPID-0188", "CSAFPID-0189", "CSAFPID-0190", "CSAFPID-0191", "CSAFPID-0192", "CSAFPID-0193", "CSAFPID-0194", "CSAFPID-0195", "CSAFPID-0196", "CSAFPID-0197", "CSAFPID-0198", "CSAFPID-0199", "CSAFPID-0200", "CSAFPID-0201", "CSAFPID-0202", "CSAFPID-0203", "CSAFPID-0204", "CSAFPID-0205", "CSAFPID-0206", "CSAFPID-0207", "CSAFPID-0208", "CSAFPID-0209", "CSAFPID-0210", "CSAFPID-0211", "CSAFPID-0212", "CSAFPID-0213", "CSAFPID-0220", "CSAFPID-0221", "CSAFPID-0222", "CSAFPID-0223", "CSAFPID-0224", "CSAFPID-0225", "CSAFPID-0226", "CSAFPID-0227", "CSAFPID-0228", "CSAFPID-0229", "CSAFPID-0230", "CSAFPID-0231", "CSAFPID-0232", "CSAFPID-0233", "CSAFPID-0234", "CSAFPID-0235", "CSAFPID-0243", "CSAFPID-0242", "CSAFPID-0241", "CSAFPID-0240", "CSAFPID-0239", "CSAFPID-0238", "CSAFPID-0237", "CSAFPID-0236", "CSAFPID-0244", "CSAFPID-0245", "CSAFPID-0253", "CSAFPID-0252", "CSAFPID-0251", "CSAFPID-0250", "CSAFPID-0249", "CSAFPID-0248", "CSAFPID-0247", "CSAFPID-0246", "CSAFPID-0254", "CSAFPID-0255", "CSAFPID-0256", "CSAFPID-0257", "CSAFPID-0258", "CSAFPID-0259", "CSAFPID-0260", "CSAFPID-0261", "CSAFPID-0262", "CSAFPID-0263", "CSAFPID-0264", "CSAFPID-0265", "CSAFPID-0266", "CSAFPID-0267", "CSAFPID-0268", "CSAFPID-0269", "CSAFPID-0270", "CSAFPID-0271", "CSAFPID-0272", "CSAFPID-0273", "CSAFPID-0274", "CSAFPID-0275", "CSAFPID-0276", "CSAFPID-0277", "CSAFPID-0278", "CSAFPID-0279", "CSAFPID-0280", "CSAFPID-0281", "CSAFPID-0282", "CSAFPID-0283", "CSAFPID-0284", "CSAFPID-0285", "CSAFPID-0286", "CSAFPID-0287", "CSAFPID-0288", "CSAFPID-0289", "CSAFPID-0290", "CSAFPID-0291", "CSAFPID-0292", "CSAFPID-0293", "CSAFPID-0294", "CSAFPID-0295", "CSAFPID-0296", "CSAFPID-0297", "CSAFPID-0298", "CSAFPID-0299", "CSAFPID-0300", "CSAFPID-0301", "CSAFPID-0302", "CSAFPID-0303", "CSAFPID-0304", "CSAFPID-0305", "CSAFPID-0306", "CSAFPID-0307", "CSAFPID-0308", "CSAFPID-0309", "CSAFPID-0310", "CSAFPID-0311", "CSAFPID-0312", "CSAFPID-0313", "CSAFPID-0314", "CSAFPID-0315", "CSAFPID-0316", "CSAFPID-0317", "CSAFPID-0318", "CSAFPID-0319", "CSAFPID-0320", "CSAFPID-0321", "CSAFPID-0322", "CSAFPID-0323", "CSAFPID-0324", "CSAFPID-0325", "CSAFPID-0326", "CSAFPID-0327", "CSAFPID-0328", "CSAFPID-0329", "CSAFPID-0330", "CSAFPID-0331", "CSAFPID-0332", "CSAFPID-0333", "CSAFPID-0334", "CSAFPID-0335", "CSAFPID-0336", "CSAFPID-0337", "CSAFPID-0338", "CSAFPID-0339", "CSAFPID-0340", "CSAFPID-0341", "CSAFPID-0342", "CSAFPID-0343", "CSAFPID-0344", "CSAFPID-0345", "CSAFPID-0376", "CSAFPID-0377", "CSAFPID-0378", "CSAFPID-0379", "CSAFPID-0372", "CSAFPID-0373", "CSAFPID-0374", "CSAFPID-0375", "CSAFPID-0380", "CSAFPID-0381", "CSAFPID-0358", "CSAFPID-0359", "CSAFPID-0360", "CSAFPID-0361", "CSAFPID-0354", "CSAFPID-0355", "CSAFPID-0356", "CSAFPID-0357", "CSAFPID-0350", "CSAFPID-0351", "CSAFPID-0352", "CSAFPID-0353", "CSAFPID-0346", "CSAFPID-0347", "CSAFPID-0348", "CSAFPID-0349", "CSAFPID-0366", "CSAFPID-0367", "CSAFPID-0368", "CSAFPID-0369", "CSAFPID-0362", "CSAFPID-0363", "CSAFPID-0364", "CSAFPID-0365", "CSAFPID-0370", "CSAFPID-0371", "CSAFPID-0382", "CSAFPID-0383", "CSAFPID-0384", "CSAFPID-0385", "CSAFPID-0388", "CSAFPID-0389", "CSAFPID-0386", "CSAFPID-0387", "CSAFPID-0390", "CSAFPID-0391", "CSAFPID-0392", "CSAFPID-0393", "CSAFPID-0396", "CSAFPID-0397", "CSAFPID-0394", "CSAFPID-0395", "CSAFPID-0398", "CSAFPID-0399", "CSAFPID-0402", "CSAFPID-0403", "CSAFPID-0400", "CSAFPID-0401", "CSAFPID-0406", "CSAFPID-0405", "CSAFPID-0404", "CSAFPID-0407", "CSAFPID-0411", "CSAFPID-0410", "CSAFPID-0408", "CSAFPID-0409", "CSAFPID-0412", "CSAFPID-0418", "CSAFPID-0417", "CSAFPID-0416", "CSAFPID-0415", "CSAFPID-0414", "CSAFPID-0413", "CSAFPID-0419", "CSAFPID-0420", "CSAFPID-0421", "CSAFPID-0422", "CSAFPID-0423", "CSAFPID-0424" ] } ], "title": "CVE-2024-3596" } ] }
icsa-24-193-11
Vulnerability from csaf_cisa
Published
2024-07-09 00:00
Modified
2024-11-12 00:00
Summary
Siemens RUGGEDCOM APE 1808
Notes
Summary
Palo Alto Networks has published [1] information on vulnerabilities in PAN-OS. This advisory lists the related Siemens Industrial products affected by these vulnerabilities.
Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available. Customers are advised to consult and implement the workarounds provided in Palo Alto Networks' upstream security notifications.
[1]
https://security.paloaltonetworks.com/
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Advisory Conversion Disclaimer
This CISA CSAF advisory was converted from Siemens ProductCERT's CSAF advisory.
Critical infrastructure sectors
Multiple
Countries/areas deployed
Worldwide
Company headquarters location
Germany
Recommended Practices
CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.
Recommended Practices
Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.
Recommended Practices
Locate control system networks and remote devices behind firewalls and isolate them from business networks.
Recommended Practices
When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.
Recommended Practices
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Recommended Practices
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Recommended Practices
Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Palo Alto Networks has published [1] information on vulnerabilities in PAN-OS. This advisory lists the related Siemens Industrial products affected by these vulnerabilities.\n\nSiemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available. Customers are advised to consult and implement the workarounds provided in Palo Alto Networks\u0027 upstream security notifications.\n\n[1] \nhttps://security.paloaltonetworks.com/", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-364175: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-364175.json" }, { "category": "self", "summary": "SSA-364175: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-364175.html" }, { "category": "self", "summary": "ICS Advisory ICSA-24-193-11 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-193-11.json" }, { "category": "self", "summary": "ICS Advisory ICSA-24-193-11 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-193-11" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens RUGGEDCOM APE 1808", "tracking": { "current_release_date": "2024-11-12T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-24-193-11", "initial_release_date": "2024-07-09T00:00:00.000000Z", "revision_history": [ { "date": "2024-07-09T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2024-08-13T00:00:00.000000Z", "legacy_version": "1.1", "number": "2", "summary": "Added newly published CVE-2024-5913 and CVE-2024-3596" }, { "date": "2024-10-08T00:00:00.000000Z", "legacy_version": "1.2", "number": "3", "summary": "Added CVE-2023-48795, CVE-2024-3596, CVE-2024-5913 and fix version information for Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 devices" }, { "date": "2024-11-12T00:00:00.000000Z", "legacy_version": "1.3", "number": "4", "summary": "Added newly published CVE-2024-9468 and CVE-2024-9471. Added CVSSv4.0 vector to CVE-2024-5913" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM APE1808", "product_id": "CSAFPID-0001" } }, { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM APE1808", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "RUGGEDCOM APE1808" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "summary", "text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust; and there could be effects on Bitvise SSH through 9.31.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information", "product_ids": [ "CSAFPID-0001" ] }, { "category": "workaround", "details": "CVE-2023-48795: Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation \nhttps://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "notes": [ { "category": "summary", "text": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify responses Access-Reject or Access-Accept using a chosen-prefix collision attack against MD5 Response Authenticator signature.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0002" ] }, "remediations": [ { "category": "mitigation", "details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)", "product_ids": [ "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it", "product_ids": [ "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information", "product_ids": [ "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0002" ] } ], "title": "CVE-2024-3596" }, { "cve": "CVE-2024-5913", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An improper input validation vulnerability in Palo Alto Networks PAN-OS software enables an attacker with the ability to tamper with the physical file system to elevate privileges.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0002" ] }, "remediations": [ { "category": "vendor_fix", "details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information", "product_ids": [ "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0002" ] } ], "title": "CVE-2024-5913" }, { "cve": "CVE-2024-9468", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0002" ] }, "remediations": [ { "category": "vendor_fix", "details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information", "product_ids": [ "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0002" ] } ], "title": "CVE-2024-9468" }, { "cve": "CVE-2024-9471", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "A privilege escalation (PE) vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated PAN-OS administrator with restricted privileges to use a compromised XML API key to perform actions as a higher privileged PAN-OS administrator. For example, an administrator with \"Virtual system administrator (read-only)\" access could use an XML API key of a \"Virtual system administrator\" to perform write operations on the virtual system configuration even though they should be limited to read-only operations.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0002" ] }, "remediations": [ { "category": "vendor_fix", "details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information", "product_ids": [ "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0002" ] } ], "title": "CVE-2024-9471" } ] }
icsa-24-193-05
Vulnerability from csaf_cisa
Published
2024-07-09 00:00
Modified
2024-11-12 00:00
Summary
Siemens SCALANCE, RUGGEDCOM, SIPLUS, and SINEC
Notes
Summary
This advisory documents the impact of CVE-2024-3596 (also dubbed "Blastradius"), a vulnerability in the RADIUS protocol, to SCALANCE, RUGGEDCOM and related products.
The vulnerability could allow on-path attackers, located between a Network Access Server (the RADIUS client, e.g., SCALANCE or RUGGEDCOM devices) and a RADIUS server (e.g., SINEC INS), to forge Access-Request packets in a way that enables them to modify the corresponding server response packet at will, e.g., turning an "Access-Reject" message into an "Access-Accept". This would cause the Network Access Server to grant the attackers access to the network with the attackers desired authorization (and without the need of knowing or guessing legitimate access credentials).
Further details, the impact to SCALANCE, RUGGEDCOM and related products, specific countermeasures and external references can be found in the chapter "Additional Information".
Siemens has released a new version for RUGGEDCOM CROSSBOW and recommends to update to the latest version. Siemens is preparing further fix versions and recommends countermeasures for products where fixes are not, or not yet available.
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Advisory Conversion Disclaimer
This CISA CSAF advisory was converted from Siemens ProductCERT's CSAF advisory.
Critical infrastructure sectors
Multiple
Countries/areas deployed
Worldwide
Company headquarters location
Germany
Recommended Practices
CISA recommends users take defensive measures to minimize the exploitation risk of these vulnerabilities.
Recommended Practices
Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.
Recommended Practices
Locate control system networks and remote devices behind firewalls and isolate them from business networks.
Recommended Practices
When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.
Recommended Practices
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Recommended Practices
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Recommended Practices
Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting this vulnerability to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "This advisory documents the impact of CVE-2024-3596 (also dubbed \"Blastradius\"), a vulnerability in the RADIUS protocol, to SCALANCE, RUGGEDCOM and related products.\n\nThe vulnerability could allow on-path attackers, located between a Network Access Server (the RADIUS client, e.g., SCALANCE or RUGGEDCOM devices) and a RADIUS server (e.g., SINEC INS), to forge Access-Request packets in a way that enables them to modify the corresponding server response packet at will, e.g., turning an \"Access-Reject\" message into an \"Access-Accept\". This would cause the Network Access Server to grant the attackers access to the network with the attackers desired authorization (and without the need of knowing or guessing legitimate access credentials).\n\nFurther details, the impact to SCALANCE, RUGGEDCOM and related products, specific countermeasures and external references can be found in the chapter \"Additional Information\".\n\nSiemens has released a new version for RUGGEDCOM CROSSBOW and recommends to update to the latest version. Siemens is preparing further fix versions and recommends countermeasures for products where fixes are not, or not yet available.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of these vulnerabilities.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-723487: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-723487.json" }, { "category": "self", "summary": "SSA-723487: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-723487.html" }, { "category": "self", "summary": "ICS Advisory ICSA-24-193-05 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-193-05.json" }, { "category": "self", "summary": "ICS Advisory ICSA-24-193-05 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-193-05" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens SCALANCE, RUGGEDCOM, SIPLUS, and SINEC", "tracking": { "current_release_date": "2024-11-12T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-24-193-05", "initial_release_date": "2024-07-09T00:00:00.000000Z", "revision_history": [ { "date": "2024-07-09T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2024-07-22T00:00:00.000000Z", "legacy_version": "1.1", "number": "2", "summary": "Clarified that the fix for SCALANCE X-300 family (incl. X408 and SIPLUS NET variants) in V4.1.8 only covers RADIUS client mitigation C1, but not C2" }, { "date": "2024-11-12T00:00:00.000000Z", "legacy_version": "1.2", "number": "3", "summary": "Added fix for RUGGEDCOM CROSSBOW" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/\u003cV5.6", "product": { "name": "RUGGEDCOM CROSSBOW", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "RUGGEDCOM CROSSBOW" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM i800", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "RUGGEDCOM i800" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM i800NC", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "RUGGEDCOM i800NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM i801", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "RUGGEDCOM i801" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM i801NC", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "RUGGEDCOM i801NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM i802", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "RUGGEDCOM i802" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM i802NC", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "RUGGEDCOM i802NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM i803", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "RUGGEDCOM i803" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM i803NC", "product_id": "CSAFPID-0009" } } ], "category": "product_name", "name": "RUGGEDCOM i803NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM M969", "product_id": "CSAFPID-0010" } } ], "category": "product_name", "name": "RUGGEDCOM M969" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM M969NC", "product_id": "CSAFPID-0011" } } ], "category": "product_name", "name": "RUGGEDCOM M969NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM M2100", "product_id": "CSAFPID-0012" } } ], "category": "product_name", "name": "RUGGEDCOM M2100" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM M2100NC", "product_id": "CSAFPID-0013" } } ], "category": "product_name", "name": "RUGGEDCOM M2100NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM M2200", "product_id": "CSAFPID-0014" } } ], "category": "product_name", "name": "RUGGEDCOM M2200" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM M2200NC", "product_id": "CSAFPID-0015" } } ], "category": "product_name", "name": "RUGGEDCOM M2200NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)", "product_id": "CSAFPID-0016", "product_identification_helper": { "model_numbers": [ "6GK6108-4AM00-2BA2" ] } } } ], "category": "product_name", "name": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)", "product_id": "CSAFPID-0017", "product_identification_helper": { "model_numbers": [ "6GK6108-4AM00-2DA2" ] } } } ], "category": "product_name", "name": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RMC30", "product_id": "CSAFPID-0018" } } ], "category": "product_name", "name": "RUGGEDCOM RMC30" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RMC30NC", "product_id": "CSAFPID-0019" } } ], "category": "product_name", "name": "RUGGEDCOM RMC30NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RMC8388 V4.X", "product_id": "CSAFPID-0020" } } ], "category": "product_name", "name": "RUGGEDCOM RMC8388 V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RMC8388 V5.X", "product_id": "CSAFPID-0021" } } ], "category": "product_name", "name": "RUGGEDCOM RMC8388 V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RMC8388NC V4.X", "product_id": "CSAFPID-0022" } } ], "category": "product_name", "name": "RUGGEDCOM RMC8388NC V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RMC8388NC V5.X", "product_id": "CSAFPID-0023" } } ], "category": "product_name", "name": "RUGGEDCOM RMC8388NC V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM ROX MX5000", "product_id": "CSAFPID-0024" } } ], "category": "product_name", "name": "RUGGEDCOM ROX MX5000" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM ROX MX5000RE", "product_id": "CSAFPID-0025" } } ], "category": "product_name", "name": "RUGGEDCOM ROX MX5000RE" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM ROX RX1400", "product_id": "CSAFPID-0026" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1400" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM ROX RX1500", "product_id": "CSAFPID-0027" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1500" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM ROX RX1501", "product_id": "CSAFPID-0028" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1501" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM ROX RX1510", "product_id": "CSAFPID-0029" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1510" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM ROX RX1511", "product_id": "CSAFPID-0030" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1511" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM ROX RX1512", "product_id": "CSAFPID-0031" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1512" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM ROX RX1524", "product_id": "CSAFPID-0032" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1524" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM ROX RX1536", "product_id": "CSAFPID-0033" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX1536" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM ROX RX5000", "product_id": "CSAFPID-0034" } } ], "category": "product_name", "name": "RUGGEDCOM ROX RX5000" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RP110", "product_id": "CSAFPID-0035" } } ], "category": "product_name", "name": "RUGGEDCOM RP110" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RP110NC", "product_id": "CSAFPID-0036" } } ], "category": "product_name", "name": "RUGGEDCOM RP110NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS400", "product_id": "CSAFPID-0037" } } ], "category": "product_name", "name": "RUGGEDCOM RS400" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS400NC", "product_id": "CSAFPID-0038" } } ], "category": "product_name", "name": "RUGGEDCOM RS400NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS401", "product_id": "CSAFPID-0039" } } ], "category": "product_name", "name": "RUGGEDCOM RS401" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS401NC", "product_id": "CSAFPID-0040" } } ], "category": "product_name", "name": "RUGGEDCOM RS401NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS416", "product_id": "CSAFPID-0041" } } ], "category": "product_name", "name": "RUGGEDCOM RS416" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS416NC", "product_id": "CSAFPID-0042" } } ], "category": "product_name", "name": "RUGGEDCOM RS416NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS416NCv2 V4.X", "product_id": "CSAFPID-0043" } } ], "category": "product_name", "name": "RUGGEDCOM RS416NCv2 V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS416NCv2 V5.X", "product_id": "CSAFPID-0044" } } ], "category": "product_name", "name": "RUGGEDCOM RS416NCv2 V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS416P", "product_id": "CSAFPID-0045" } } ], "category": "product_name", "name": "RUGGEDCOM RS416P" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS416PNC", "product_id": "CSAFPID-0046" } } ], "category": "product_name", "name": "RUGGEDCOM RS416PNC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS416PNCv2 V4.X", "product_id": "CSAFPID-0047" } } ], "category": "product_name", "name": "RUGGEDCOM RS416PNCv2 V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS416PNCv2 V5.X", "product_id": "CSAFPID-0048" } } ], "category": "product_name", "name": "RUGGEDCOM RS416PNCv2 V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS416Pv2 V4.X", "product_id": "CSAFPID-0049" } } ], "category": "product_name", "name": "RUGGEDCOM RS416Pv2 V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS416Pv2 V5.X", "product_id": "CSAFPID-0050" } } ], "category": "product_name", "name": "RUGGEDCOM RS416Pv2 V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS416v2 V4.X", "product_id": "CSAFPID-0051" } } ], "category": "product_name", "name": "RUGGEDCOM RS416v2 V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS416v2 V5.X", "product_id": "CSAFPID-0052" } } ], "category": "product_name", "name": "RUGGEDCOM RS416v2 V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900", "product_id": "CSAFPID-0053" } } ], "category": "product_name", "name": "RUGGEDCOM RS900" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900 (32M) V4.X", "product_id": "CSAFPID-0054" } } ], "category": "product_name", "name": "RUGGEDCOM RS900 (32M) V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900 (32M) V5.X", "product_id": "CSAFPID-0055" } } ], "category": "product_name", "name": "RUGGEDCOM RS900 (32M) V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900G", "product_id": "CSAFPID-0056" } } ], "category": "product_name", "name": "RUGGEDCOM RS900G" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900G (32M) V4.X", "product_id": "CSAFPID-0057" } } ], "category": "product_name", "name": "RUGGEDCOM RS900G (32M) V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900G (32M) V5.X", "product_id": "CSAFPID-0058" } } ], "category": "product_name", "name": "RUGGEDCOM RS900G (32M) V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900GNC", "product_id": "CSAFPID-0059" } } ], "category": "product_name", "name": "RUGGEDCOM RS900GNC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900GNC(32M) V4.X", "product_id": "CSAFPID-0060" } } ], "category": "product_name", "name": "RUGGEDCOM RS900GNC(32M) V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900GNC(32M) V5.X", "product_id": "CSAFPID-0061" } } ], "category": "product_name", "name": "RUGGEDCOM RS900GNC(32M) V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900GP", "product_id": "CSAFPID-0062" } } ], "category": "product_name", "name": "RUGGEDCOM RS900GP" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900GPNC", "product_id": "CSAFPID-0063" } } ], "category": "product_name", "name": "RUGGEDCOM RS900GPNC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900M-GETS-C01", "product_id": "CSAFPID-0064" } } ], "category": "product_name", "name": "RUGGEDCOM RS900M-GETS-C01" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900M-GETS-XX", "product_id": "CSAFPID-0065" } } ], "category": "product_name", "name": "RUGGEDCOM RS900M-GETS-XX" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900M-STND-C01", "product_id": "CSAFPID-0066" } } ], "category": "product_name", "name": "RUGGEDCOM RS900M-STND-C01" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900M-STND-XX", "product_id": "CSAFPID-0067" } } ], "category": "product_name", "name": "RUGGEDCOM RS900M-STND-XX" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900MNC-GETS-C01", "product_id": "CSAFPID-0068" } } ], "category": "product_name", "name": "RUGGEDCOM RS900MNC-GETS-C01" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900MNC-GETS-XX", "product_id": "CSAFPID-0069" } } ], "category": "product_name", "name": "RUGGEDCOM RS900MNC-GETS-XX" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900MNC-STND-XX", "product_id": "CSAFPID-0070" } } ], "category": "product_name", "name": "RUGGEDCOM RS900MNC-STND-XX" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900MNC-STND-XX-C01", "product_id": "CSAFPID-0071" } } ], "category": "product_name", "name": "RUGGEDCOM RS900MNC-STND-XX-C01" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900NC", "product_id": "CSAFPID-0072" } } ], "category": "product_name", "name": "RUGGEDCOM RS900NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900NC(32M) V4.X", "product_id": "CSAFPID-0073" } } ], "category": "product_name", "name": "RUGGEDCOM RS900NC(32M) V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900NC(32M) V5.X", "product_id": "CSAFPID-0074" } } ], "category": "product_name", "name": "RUGGEDCOM RS900NC(32M) V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS900W", "product_id": "CSAFPID-0075" } } ], "category": "product_name", "name": "RUGGEDCOM RS900W" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS910", "product_id": "CSAFPID-0076" } } ], "category": "product_name", "name": "RUGGEDCOM RS910" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS910NC", "product_id": "CSAFPID-0077" } } ], "category": "product_name", "name": "RUGGEDCOM RS910NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS910W", "product_id": "CSAFPID-0078" } } ], "category": "product_name", "name": "RUGGEDCOM RS910W" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS940G", "product_id": "CSAFPID-0079" } } ], "category": "product_name", "name": "RUGGEDCOM RS940G" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS940GNC", "product_id": "CSAFPID-0080" } } ], "category": "product_name", "name": "RUGGEDCOM RS940GNC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS1600", "product_id": "CSAFPID-0081" } } ], "category": "product_name", "name": "RUGGEDCOM RS1600" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS1600F", "product_id": "CSAFPID-0082" } } ], "category": "product_name", "name": "RUGGEDCOM RS1600F" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS1600FNC", "product_id": "CSAFPID-0083" } } ], "category": "product_name", "name": "RUGGEDCOM RS1600FNC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS1600NC", "product_id": "CSAFPID-0084" } } ], "category": "product_name", "name": "RUGGEDCOM RS1600NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS1600T", "product_id": "CSAFPID-0085" } } ], "category": "product_name", "name": "RUGGEDCOM RS1600T" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS1600TNC", "product_id": "CSAFPID-0086" } } ], "category": "product_name", "name": "RUGGEDCOM RS1600TNC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS8000", "product_id": "CSAFPID-0087" } } ], "category": "product_name", "name": "RUGGEDCOM RS8000" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS8000A", "product_id": "CSAFPID-0088" } } ], "category": "product_name", "name": "RUGGEDCOM RS8000A" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS8000ANC", "product_id": "CSAFPID-0089" } } ], "category": "product_name", "name": "RUGGEDCOM RS8000ANC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS8000H", "product_id": "CSAFPID-0090" } } ], "category": "product_name", "name": "RUGGEDCOM RS8000H" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS8000HNC", "product_id": "CSAFPID-0091" } } ], "category": "product_name", "name": "RUGGEDCOM RS8000HNC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS8000NC", "product_id": "CSAFPID-0092" } } ], "category": "product_name", "name": "RUGGEDCOM RS8000NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS8000T", "product_id": "CSAFPID-0093" } } ], "category": "product_name", "name": "RUGGEDCOM RS8000T" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RS8000TNC", "product_id": "CSAFPID-0094" } } ], "category": "product_name", "name": "RUGGEDCOM RS8000TNC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG907R", "product_id": "CSAFPID-0095" } } ], "category": "product_name", "name": "RUGGEDCOM RSG907R" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG908C", "product_id": "CSAFPID-0096" } } ], "category": "product_name", "name": "RUGGEDCOM RSG908C" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG909R", "product_id": "CSAFPID-0097" } } ], "category": "product_name", "name": "RUGGEDCOM RSG909R" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG910C", "product_id": "CSAFPID-0098" } } ], "category": "product_name", "name": "RUGGEDCOM RSG910C" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG920P V4.X", "product_id": "CSAFPID-0099" } } ], "category": "product_name", "name": "RUGGEDCOM RSG920P V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG920P V5.X", "product_id": "CSAFPID-0100" } } ], "category": "product_name", "name": "RUGGEDCOM RSG920P V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG920PNC V4.X", "product_id": "CSAFPID-0101" } } ], "category": "product_name", "name": "RUGGEDCOM RSG920PNC V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG920PNC V5.X", "product_id": "CSAFPID-0102" } } ], "category": "product_name", "name": "RUGGEDCOM RSG920PNC V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2100", "product_id": "CSAFPID-0103" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2100" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2100 (32M) V4.X", "product_id": "CSAFPID-0104" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2100 (32M) V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2100 (32M) V5.X", "product_id": "CSAFPID-0105" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2100 (32M) V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2100NC", "product_id": "CSAFPID-0106" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2100NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2100NC(32M) V4.X", "product_id": "CSAFPID-0107" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2100NC(32M) V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2100NC(32M) V5.X", "product_id": "CSAFPID-0108" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2100NC(32M) V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2100P", "product_id": "CSAFPID-0109" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2100P" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2100PNC", "product_id": "CSAFPID-0110" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2100PNC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2200", "product_id": "CSAFPID-0111" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2200" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2200NC", "product_id": "CSAFPID-0112" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2200NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2288 V4.X", "product_id": "CSAFPID-0113" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2288 V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2288 V5.X", "product_id": "CSAFPID-0114" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2288 V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2288NC V4.X", "product_id": "CSAFPID-0115" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2288NC V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2288NC V5.X", "product_id": "CSAFPID-0116" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2288NC V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2300 V4.X", "product_id": "CSAFPID-0117" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2300 V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2300 V5.X", "product_id": "CSAFPID-0118" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2300 V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2300NC V4.X", "product_id": "CSAFPID-0119" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2300NC V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2300NC V5.X", "product_id": "CSAFPID-0120" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2300NC V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2300P V4.X", "product_id": "CSAFPID-0121" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2300P V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2300P V5.X", "product_id": "CSAFPID-0122" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2300P V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2300PNC V4.X", "product_id": "CSAFPID-0123" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2300PNC V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2300PNC V5.X", "product_id": "CSAFPID-0124" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2300PNC V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2488 V4.X", "product_id": "CSAFPID-0125" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2488 V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2488 V5.X", "product_id": "CSAFPID-0126" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2488 V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2488NC V4.X", "product_id": "CSAFPID-0127" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2488NC V4.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSG2488NC V5.X", "product_id": "CSAFPID-0128" } } ], "category": "product_name", "name": "RUGGEDCOM RSG2488NC V5.X" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSL910", "product_id": "CSAFPID-0129" } } ], "category": "product_name", "name": "RUGGEDCOM RSL910" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RSL910NC", "product_id": "CSAFPID-0130" } } ], "category": "product_name", "name": "RUGGEDCOM RSL910NC" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RST916C", "product_id": "CSAFPID-0131" } } ], "category": "product_name", "name": "RUGGEDCOM RST916C" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RST916P", "product_id": "CSAFPID-0132" } } ], "category": "product_name", "name": "RUGGEDCOM RST916P" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RST2228", "product_id": "CSAFPID-0133" } } ], "category": "product_name", "name": "RUGGEDCOM RST2228" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM RST2228P", "product_id": "CSAFPID-0134" } } ], "category": "product_name", "name": "RUGGEDCOM RST2228P" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)", "product_id": "CSAFPID-0135", "product_identification_helper": { "model_numbers": [ "6GK5804-0AP00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2)", "product_id": "CSAFPID-0136", "product_identification_helper": { "model_numbers": [ "6GK5812-1AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2)", "product_id": "CSAFPID-0137", "product_identification_helper": { "model_numbers": [ "6GK5812-1BA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2)", "product_id": "CSAFPID-0138", "product_identification_helper": { "model_numbers": [ "6GK5816-1AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2)", "product_id": "CSAFPID-0139", "product_identification_helper": { "model_numbers": [ "6GK5816-1BA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)", "product_id": "CSAFPID-0140", "product_identification_helper": { "model_numbers": [ "6GK5826-2AB00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)", "product_id": "CSAFPID-0141", "product_identification_helper": { "model_numbers": [ "6GK5874-2AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2)", "product_id": "CSAFPID-0142", "product_identification_helper": { "model_numbers": [ "6GK5874-3AA00-2FA2" ] } } } ], "category": "product_name", "name": "SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)", "product_id": "CSAFPID-0143", "product_identification_helper": { "model_numbers": [ "6GK5874-3AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M876-3 (6GK5876-3AA02-2BA2)", "product_id": "CSAFPID-0144", "product_identification_helper": { "model_numbers": [ "6GK5876-3AA02-2BA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-3 (6GK5876-3AA02-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)", "product_id": "CSAFPID-0145", "product_identification_helper": { "model_numbers": [ "6GK5876-3AA02-2EA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)", "product_id": "CSAFPID-0146", "product_identification_helper": { "model_numbers": [ "6GK5876-4AA10-2BA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-4 (6GK5876-4AA10-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)", "product_id": "CSAFPID-0147", "product_identification_helper": { "model_numbers": [ "6GK5876-4AA00-2BA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)", "product_id": "CSAFPID-0148", "product_identification_helper": { "model_numbers": [ "6GK5876-4AA00-2DA2" ] } } } ], "category": "product_name", "name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1)", "product_id": "CSAFPID-0149", "product_identification_helper": { "model_numbers": [ "6GK5853-2EA10-2AA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1)", "product_id": "CSAFPID-0150", "product_identification_helper": { "model_numbers": [ "6GK5853-2EA10-2BA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)", "product_id": "CSAFPID-0151", "product_identification_helper": { "model_numbers": [ "6GK5853-2EA00-2DA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1)", "product_id": "CSAFPID-0152", "product_identification_helper": { "model_numbers": [ "6GK5856-2EA10-3AA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1)", "product_id": "CSAFPID-0153", "product_identification_helper": { "model_numbers": [ "6GK5856-2EA10-3BA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1)", "product_id": "CSAFPID-0154", "product_identification_helper": { "model_numbers": [ "6GK5856-2EA00-3FA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)", "product_id": "CSAFPID-0155", "product_identification_helper": { "model_numbers": [ "6GK5856-2EA00-3DA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)", "product_id": "CSAFPID-0156", "product_identification_helper": { "model_numbers": [ "6GK5856-2EA00-3AA1" ] } } } ], "category": "product_name", "name": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2)", "product_id": "CSAFPID-0157", "product_identification_helper": { "model_numbers": [ "6GK5615-0AA01-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2)", "product_id": "CSAFPID-0158", "product_identification_helper": { "model_numbers": [ "6GK5615-0AA00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)", "product_id": "CSAFPID-0159", "product_identification_helper": { "model_numbers": [ "6GK5622-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE SC626-2C (6GK5626-2GS00-2AC2)", "product_id": "CSAFPID-0160", "product_identification_helper": { "model_numbers": [ "6GK5626-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC626-2C (6GK5626-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)", "product_id": "CSAFPID-0161", "product_identification_helper": { "model_numbers": [ "6GK5632-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)", "product_id": "CSAFPID-0162", "product_identification_helper": { "model_numbers": [ "6GK5636-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)", "product_id": "CSAFPID-0163", "product_identification_helper": { "model_numbers": [ "6GK5642-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)", "product_id": "CSAFPID-0164", "product_identification_helper": { "model_numbers": [ "6GK5646-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)", "product_id": "CSAFPID-0165", "product_identification_helper": { "model_numbers": [ "6GK5721-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)", "product_id": "CSAFPID-0166", "product_identification_helper": { "model_numbers": [ "6GK5721-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)", "product_id": "CSAFPID-0167", "product_identification_helper": { "model_numbers": [ "6GK5722-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)", "product_id": "CSAFPID-0168", "product_identification_helper": { "model_numbers": [ "6GK5722-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)", "product_id": "CSAFPID-0169", "product_identification_helper": { "model_numbers": [ "6GK5722-1FC00-0AC0" ] } } } ], "category": "product_name", "name": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)", "product_id": "CSAFPID-0170", "product_identification_helper": { "model_numbers": [ "6GK5734-1FX00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)", "product_id": "CSAFPID-0171", "product_identification_helper": { "model_numbers": [ "6GK5734-1FX00-0AA6" ] } } } ], "category": "product_name", "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)", "product_id": "CSAFPID-0172", "product_identification_helper": { "model_numbers": [ "6GK5734-1FX00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)", "product_id": "CSAFPID-0173", "product_identification_helper": { "model_numbers": [ "6GK5734-1FX00-0AB6" ] } } } ], "category": "product_name", "name": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)", "product_id": "CSAFPID-0174", "product_identification_helper": { "model_numbers": [ "6GK5738-1GY00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)", "product_id": "CSAFPID-0175", "product_identification_helper": { "model_numbers": [ "6GK5738-1GY00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)", "product_id": "CSAFPID-0176", "product_identification_helper": { "model_numbers": [ "6GK5748-1GD00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)", "product_id": "CSAFPID-0177", "product_identification_helper": { "model_numbers": [ "6GK5748-1GD00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)", "product_id": "CSAFPID-0178", "product_identification_helper": { "model_numbers": [ "6GK5748-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)", "product_id": "CSAFPID-0179", "product_identification_helper": { "model_numbers": [ "6GK5748-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)", "product_id": "CSAFPID-0180", "product_identification_helper": { "model_numbers": [ "6GK5761-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)", "product_id": "CSAFPID-0181", "product_identification_helper": { "model_numbers": [ "6GK5761-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)", "product_id": "CSAFPID-0182", "product_identification_helper": { "model_numbers": [ "6GK5774-1FY00-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)", "product_id": "CSAFPID-0183", "product_identification_helper": { "model_numbers": [ "6GK5774-1FY00-0TB0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)", "product_id": "CSAFPID-0184", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)", "product_id": "CSAFPID-0185", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AA6" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)", "product_id": "CSAFPID-0186", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)", "product_id": "CSAFPID-0187", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AC0" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)", "product_id": "CSAFPID-0188", "product_identification_helper": { "model_numbers": [ "6GK5774-1FX00-0AB6" ] } } } ], "category": "product_name", "name": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)", "product_id": "CSAFPID-0189", "product_identification_helper": { "model_numbers": [ "6GK5778-1GY00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)", "product_id": "CSAFPID-0190", "product_identification_helper": { "model_numbers": [ "6GK5778-1GY00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)", "product_id": "CSAFPID-0191", "product_identification_helper": { "model_numbers": [ "6GK5778-1GY00-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)", "product_id": "CSAFPID-0192", "product_identification_helper": { "model_numbers": [ "6GK5778-1GY00-0TB0" ] } } } ], "category": "product_name", "name": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)", "product_id": "CSAFPID-0193", "product_identification_helper": { "model_numbers": [ "6GK5786-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)", "product_id": "CSAFPID-0194", "product_identification_helper": { "model_numbers": [ "6GK5786-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)", "product_id": "CSAFPID-0195", "product_identification_helper": { "model_numbers": [ "6GK5786-2FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)", "product_id": "CSAFPID-0196", "product_identification_helper": { "model_numbers": [ "6GK5786-2FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)", "product_id": "CSAFPID-0197", "product_identification_helper": { "model_numbers": [ "6GK5786-2FC00-0AC0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)", "product_id": "CSAFPID-0198", "product_identification_helper": { "model_numbers": [ "6GK5786-2FE00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)", "product_id": "CSAFPID-0199", "product_identification_helper": { "model_numbers": [ "6GK5786-2FE00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)", "product_id": "CSAFPID-0200", "product_identification_helper": { "model_numbers": [ "6GK5786-2HC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)", "product_id": "CSAFPID-0201", "product_identification_helper": { "model_numbers": [ "6GK5786-2HC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)", "product_id": "CSAFPID-0202", "product_identification_helper": { "model_numbers": [ "6GK5788-1GD00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)", "product_id": "CSAFPID-0203", "product_identification_helper": { "model_numbers": [ "6GK5788-1GD00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)", "product_id": "CSAFPID-0204", "product_identification_helper": { "model_numbers": [ "6GK5788-1FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)", "product_id": "CSAFPID-0205", "product_identification_helper": { "model_numbers": [ "6GK5788-1FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)", "product_id": "CSAFPID-0206", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)", "product_id": "CSAFPID-0207", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)", "product_id": "CSAFPID-0208", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)", "product_id": "CSAFPID-0209", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0TB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)", "product_id": "CSAFPID-0210", "product_identification_helper": { "model_numbers": [ "6GK5788-2GD00-0TC0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)", "product_id": "CSAFPID-0211", "product_identification_helper": { "model_numbers": [ "6GK5788-2FC00-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)", "product_id": "CSAFPID-0212", "product_identification_helper": { "model_numbers": [ "6GK5788-2FC00-0AB0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)", "product_id": "CSAFPID-0213", "product_identification_helper": { "model_numbers": [ "6GK5788-2FC00-0AC0" ] } } } ], "category": "product_name", "name": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)", "product_id": "CSAFPID-0214", "product_identification_helper": { "model_numbers": [ "6GK5748-1GY01-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)", "product_id": "CSAFPID-0215", "product_identification_helper": { "model_numbers": [ "6GK5748-1GY01-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)", "product_id": "CSAFPID-0216", "product_identification_helper": { "model_numbers": [ "6GK5788-1GY01-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)", "product_id": "CSAFPID-0217", "product_identification_helper": { "model_numbers": [ "6GK5788-2GY01-0TA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)", "product_id": "CSAFPID-0218", "product_identification_helper": { "model_numbers": [ "6GK5788-2GY01-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)", "product_id": "CSAFPID-0219", "product_identification_helper": { "model_numbers": [ "6GK5788-2HY01-0AA0" ] } } } ], "category": "product_name", "name": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)", "product_id": "CSAFPID-0220", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-7DA0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0)", "product_id": "CSAFPID-0221", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-7DC0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0)", "product_id": "CSAFPID-0222", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-7DB0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0)", "product_id": "CSAFPID-0223", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7DA0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0)", "product_id": "CSAFPID-0224", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7DC0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)", "product_id": "CSAFPID-0225", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7DB0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0)", "product_id": "CSAFPID-0226", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7TA0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0)", "product_id": "CSAFPID-0227", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7TC0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)", "product_id": "CSAFPID-0228", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-7TB0" ] } } } ], "category": "product_name", "name": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)", "product_id": "CSAFPID-0229", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-3AA0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)", "product_id": "CSAFPID-0230", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-3DA0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0)", "product_id": "CSAFPID-0231", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-3AB0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0)", "product_id": "CSAFPID-0232", "product_identification_helper": { "model_numbers": [ "6GK5763-1AL00-3DB0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0)", "product_id": "CSAFPID-0233", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-3DA0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0)", "product_id": "CSAFPID-0234", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-3DC0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0)", "product_id": "CSAFPID-0235", "product_identification_helper": { "model_numbers": [ "6GK5766-1GE00-3DB0" ] } } } ], "category": "product_name", "name": "SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3)", "product_id": "CSAFPID-0236", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-2EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3)", "product_id": "CSAFPID-0237", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-2GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3)", "product_id": "CSAFPID-0238", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-4EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3)", "product_id": "CSAFPID-0239", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-4GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3)", "product_id": "CSAFPID-0240", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-1EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3)", "product_id": "CSAFPID-0241", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-1GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3)", "product_id": "CSAFPID-0242", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-3EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3)", "product_id": "CSAFPID-0243", "product_identification_helper": { "model_numbers": [ "6GK5302-7GD00-3GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3)", "product_id": "CSAFPID-0244", "product_identification_helper": { "model_numbers": [ "6GK5304-2BD00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3)", "product_id": "CSAFPID-0245", "product_identification_helper": { "model_numbers": [ "6GK5306-1BF00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3)", "product_id": "CSAFPID-0246", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-2EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3)", "product_id": "CSAFPID-0247", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-2GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3)", "product_id": "CSAFPID-0248", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-4EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3)", "product_id": "CSAFPID-0249", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-4GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3)", "product_id": "CSAFPID-0250", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-1EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3)", "product_id": "CSAFPID-0251", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-1GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3)", "product_id": "CSAFPID-0252", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-3EA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3)", "product_id": "CSAFPID-0253", "product_identification_helper": { "model_numbers": [ "6GK5307-2FD00-3GA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-3 (6GK5307-3BL00-2AA3)", "product_id": "CSAFPID-0254", "product_identification_helper": { "model_numbers": [ "6GK5307-3BL00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-3 (6GK5307-3BL00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-3 (6GK5307-3BL10-2AA3)", "product_id": "CSAFPID-0255", "product_identification_helper": { "model_numbers": [ "6GK5307-3BL10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-3 (6GK5307-3BL10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3)", "product_id": "CSAFPID-0256", "product_identification_helper": { "model_numbers": [ "6GK5307-3BM00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3)", "product_id": "CSAFPID-0257", "product_identification_helper": { "model_numbers": [ "6GK5307-3BM10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2 (6GK5308-2FL00-2AA3)", "product_id": "CSAFPID-0258", "product_identification_helper": { "model_numbers": [ "6GK5308-2FL00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2 (6GK5308-2FL00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2 (6GK5308-2FL10-2AA3)", "product_id": "CSAFPID-0259", "product_identification_helper": { "model_numbers": [ "6GK5308-2FL10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2 (6GK5308-2FL10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3)", "product_id": "CSAFPID-0260", "product_identification_helper": { "model_numbers": [ "6GK5308-2FM00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3)", "product_id": "CSAFPID-0261", "product_identification_helper": { "model_numbers": [ "6GK5308-2FM10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3)", "product_id": "CSAFPID-0262", "product_identification_helper": { "model_numbers": [ "6GK5308-2FN00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3)", "product_id": "CSAFPID-0263", "product_identification_helper": { "model_numbers": [ "6GK5308-2FN10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3)", "product_id": "CSAFPID-0264", "product_identification_helper": { "model_numbers": [ "6GK5308-2FP00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3)", "product_id": "CSAFPID-0265", "product_identification_helper": { "model_numbers": [ "6GK5308-2FP10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M (6GK5308-2GG00-2AA2)", "product_id": "CSAFPID-0266", "product_identification_helper": { "model_numbers": [ "6GK5308-2GG00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M (6GK5308-2GG00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M (6GK5308-2GG10-2AA2)", "product_id": "CSAFPID-0267", "product_identification_helper": { "model_numbers": [ "6GK5308-2GG10-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M (6GK5308-2GG10-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2)", "product_id": "CSAFPID-0268", "product_identification_helper": { "model_numbers": [ "6GK5308-2QG00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2)", "product_id": "CSAFPID-0269", "product_identification_helper": { "model_numbers": [ "6GK5308-2QG10-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2)", "product_id": "CSAFPID-0270", "product_identification_helper": { "model_numbers": [ "6GK5308-2GG00-2CA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2)", "product_id": "CSAFPID-0271", "product_identification_helper": { "model_numbers": [ "6GK5308-2GG10-2CA2" ] } } } ], "category": "product_name", "name": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X310 (6GK5310-0FA00-2AA3)", "product_id": "CSAFPID-0272", "product_identification_helper": { "model_numbers": [ "6GK5310-0FA00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X310 (6GK5310-0FA00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X310 (6GK5310-0FA10-2AA3)", "product_id": "CSAFPID-0273", "product_identification_helper": { "model_numbers": [ "6GK5310-0FA10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X310 (6GK5310-0FA10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X310FE (6GK5310-0BA00-2AA3)", "product_id": "CSAFPID-0274", "product_identification_helper": { "model_numbers": [ "6GK5310-0BA00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X310FE (6GK5310-0BA00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X310FE (6GK5310-0BA10-2AA3)", "product_id": "CSAFPID-0275", "product_identification_helper": { "model_numbers": [ "6GK5310-0BA10-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X310FE (6GK5310-0BA10-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3)", "product_id": "CSAFPID-0276", "product_identification_helper": { "model_numbers": [ "6GK5320-1BD00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3)", "product_id": "CSAFPID-0277", "product_identification_helper": { "model_numbers": [ "6GK5320-3BF00-2AA3" ] } } } ], "category": "product_name", "name": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE X408-2 (6GK5408-2FD00-2AA2)", "product_id": "CSAFPID-0278", "product_identification_helper": { "model_numbers": [ "6GK5408-2FD00-2AA2" ] } } } ], "category": "product_name", "name": "SCALANCE X408-2 (6GK5408-2FD00-2AA2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2)", "product_id": "CSAFPID-0279", "product_identification_helper": { "model_numbers": [ "6GK5205-3BB00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2)", "product_id": "CSAFPID-0280", "product_identification_helper": { "model_numbers": [ "6GK5205-3BB00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2)", "product_id": "CSAFPID-0281", "product_identification_helper": { "model_numbers": [ "6GK5205-3BD00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2)", "product_id": "CSAFPID-0282", "product_identification_helper": { "model_numbers": [ "6GK5205-3BD00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2)", "product_id": "CSAFPID-0283", "product_identification_helper": { "model_numbers": [ "6GK5205-3BF00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2)", "product_id": "CSAFPID-0284", "product_identification_helper": { "model_numbers": [ "6GK5205-3BF00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2)", "product_id": "CSAFPID-0285", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2)", "product_id": "CSAFPID-0286", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2)", "product_id": "CSAFPID-0287", "product_identification_helper": { "model_numbers": [ "6GK5213-3BD00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2)", "product_id": "CSAFPID-0288", "product_identification_helper": { "model_numbers": [ "6GK5213-3BD00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2)", "product_id": "CSAFPID-0289", "product_identification_helper": { "model_numbers": [ "6GK5213-3BB00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2)", "product_id": "CSAFPID-0290", "product_identification_helper": { "model_numbers": [ "6GK5213-3BB00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2)", "product_id": "CSAFPID-0291", "product_identification_helper": { "model_numbers": [ "6GK5213-3BF00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2)", "product_id": "CSAFPID-0292", "product_identification_helper": { "model_numbers": [ "6GK5213-3BF00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2)", "product_id": "CSAFPID-0293", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2TB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2)", "product_id": "CSAFPID-0294", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2AB2" ] } } } ], "category": "product_name", "name": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2)", "product_id": "CSAFPID-0295", "product_identification_helper": { "model_numbers": [ "6GK5206-2BD00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2)", "product_id": "CSAFPID-0296", "product_identification_helper": { "model_numbers": [ "6GK5206-2BB00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2)", "product_id": "CSAFPID-0297", "product_identification_helper": { "model_numbers": [ "6GK5206-2RS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2)", "product_id": "CSAFPID-0298", "product_identification_helper": { "model_numbers": [ "6GK5206-2RS00-5AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2)", "product_id": "CSAFPID-0299", "product_identification_helper": { "model_numbers": [ "6GK5206-2RS00-5FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2)", "product_id": "CSAFPID-0300", "product_identification_helper": { "model_numbers": [ "6GK5206-2BS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2)", "product_id": "CSAFPID-0301", "product_identification_helper": { "model_numbers": [ "6GK5206-2BS00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2)", "product_id": "CSAFPID-0302", "product_identification_helper": { "model_numbers": [ "6GK5206-2GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2)", "product_id": "CSAFPID-0303", "product_identification_helper": { "model_numbers": [ "6GK5206-2GS00-2TC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2)", "product_id": "CSAFPID-0304", "product_identification_helper": { "model_numbers": [ "6GK5206-2GS00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC208 (6GK5208-0BA00-2AC2)", "product_id": "CSAFPID-0305", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208 (6GK5208-0BA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2)", "product_id": "CSAFPID-0306", "product_identification_helper": { "model_numbers": [ "6GK5208-0BA00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC208G (6GK5208-0GA00-2AC2)", "product_id": "CSAFPID-0307", "product_identification_helper": { "model_numbers": [ "6GK5208-0GA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G (6GK5208-0GA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2)", "product_id": "CSAFPID-0308", "product_identification_helper": { "model_numbers": [ "6GK5208-0GA00-2TC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2)", "product_id": "CSAFPID-0309", "product_identification_helper": { "model_numbers": [ "6GK5208-0GA00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2)", "product_id": "CSAFPID-0310", "product_identification_helper": { "model_numbers": [ "6GK5208-0RA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2)", "product_id": "CSAFPID-0311", "product_identification_helper": { "model_numbers": [ "6GK5208-0RA00-5AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC216 (6GK5216-0BA00-2AC2)", "product_id": "CSAFPID-0312", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216 (6GK5216-0BA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2)", "product_id": "CSAFPID-0313", "product_identification_helper": { "model_numbers": [ "6GK5216-3RS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2)", "product_id": "CSAFPID-0314", "product_identification_helper": { "model_numbers": [ "6GK5216-3RS00-5AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2)", "product_id": "CSAFPID-0315", "product_identification_helper": { "model_numbers": [ "6GK5216-4BS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2)", "product_id": "CSAFPID-0316", "product_identification_helper": { "model_numbers": [ "6GK5216-4GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2)", "product_id": "CSAFPID-0317", "product_identification_helper": { "model_numbers": [ "6GK5216-4GS00-2TC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2)", "product_id": "CSAFPID-0318", "product_identification_helper": { "model_numbers": [ "6GK5216-4GS00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2)", "product_id": "CSAFPID-0319", "product_identification_helper": { "model_numbers": [ "6GK5216-0BA00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC224 (6GK5224-0BA00-2AC2)", "product_id": "CSAFPID-0320", "product_identification_helper": { "model_numbers": [ "6GK5224-0BA00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC224 (6GK5224-0BA00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2)", "product_id": "CSAFPID-0321", "product_identification_helper": { "model_numbers": [ "6GK5224-4GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2)", "product_id": "CSAFPID-0322", "product_identification_helper": { "model_numbers": [ "6GK5224-4GS00-2TC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2)", "product_id": "CSAFPID-0323", "product_identification_helper": { "model_numbers": [ "6GK5224-4GS00-2FC2" ] } } } ], "category": "product_name", "name": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XCH328 (6GK5328-4TS01-2EC2)", "product_id": "CSAFPID-0324", "product_identification_helper": { "model_numbers": [ "6GK5328-4TS01-2EC2" ] } } } ], "category": "product_name", "name": "SCALANCE XCH328 (6GK5328-4TS01-2EC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XCM324 (6GK5324-8TS01-2AC2)", "product_id": "CSAFPID-0325", "product_identification_helper": { "model_numbers": [ "6GK5324-8TS01-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XCM324 (6GK5324-8TS01-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XCM328 (6GK5328-4TS01-2AC2)", "product_id": "CSAFPID-0326", "product_identification_helper": { "model_numbers": [ "6GK5328-4TS01-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XCM328 (6GK5328-4TS01-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XCM332 (6GK5332-0GA01-2AC2)", "product_id": "CSAFPID-0327", "product_identification_helper": { "model_numbers": [ "6GK5332-0GA01-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XCM332 (6GK5332-0GA01-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XF204 (6GK5204-0BA00-2GF2)", "product_id": "CSAFPID-0328", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2GF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204 (6GK5204-0BA00-2GF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2)", "product_id": "CSAFPID-0329", "product_identification_helper": { "model_numbers": [ "6GK5204-0BA00-2YF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2)", "product_id": "CSAFPID-0330", "product_identification_helper": { "model_numbers": [ "6GK5204-2AA00-2GF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2)", "product_id": "CSAFPID-0331", "product_identification_helper": { "model_numbers": [ "6GK5204-2AA00-2YF2" ] } } } ], "category": "product_name", "name": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2)", "product_id": "CSAFPID-0332", "product_identification_helper": { "model_numbers": [ "6GK5408-4GP00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2)", "product_id": "CSAFPID-0333", "product_identification_helper": { "model_numbers": [ "6GK5408-4GQ00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2)", "product_id": "CSAFPID-0334", "product_identification_helper": { "model_numbers": [ "6GK5408-8GS00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2)", "product_id": "CSAFPID-0335", "product_identification_helper": { "model_numbers": [ "6GK5408-8GR00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2)", "product_id": "CSAFPID-0336", "product_identification_helper": { "model_numbers": [ "6GK5416-4GS00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2)", "product_id": "CSAFPID-0337", "product_identification_helper": { "model_numbers": [ "6GK5416-4GR00-2AM2" ] } } } ], "category": "product_name", "name": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XP208 (6GK5208-0HA00-2AS6)", "product_id": "CSAFPID-0338", "product_identification_helper": { "model_numbers": [ "6GK5208-0HA00-2AS6" ] } } } ], "category": "product_name", "name": "SCALANCE XP208 (6GK5208-0HA00-2AS6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6)", "product_id": "CSAFPID-0339", "product_identification_helper": { "model_numbers": [ "6GK5208-0HA00-2TS6" ] } } } ], "category": "product_name", "name": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6)", "product_id": "CSAFPID-0340", "product_identification_helper": { "model_numbers": [ "6GK5208-0HA00-2ES6" ] } } } ], "category": "product_name", "name": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6)", "product_id": "CSAFPID-0341", "product_identification_helper": { "model_numbers": [ "6GK5208-0UA00-5ES6" ] } } } ], "category": "product_name", "name": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XP216 (6GK5216-0HA00-2AS6)", "product_id": "CSAFPID-0342", "product_identification_helper": { "model_numbers": [ "6GK5216-0HA00-2AS6" ] } } } ], "category": "product_name", "name": "SCALANCE XP216 (6GK5216-0HA00-2AS6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6)", "product_id": "CSAFPID-0343", "product_identification_helper": { "model_numbers": [ "6GK5216-0HA00-2TS6" ] } } } ], "category": "product_name", "name": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6)", "product_id": "CSAFPID-0344", "product_identification_helper": { "model_numbers": [ "6GK5216-0HA00-2ES6" ] } } } ], "category": "product_name", "name": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6)", "product_id": "CSAFPID-0345", "product_identification_helper": { "model_numbers": [ "6GK5216-0UA00-5ES6" ] } } } ], "category": "product_name", "name": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2)", "product_id": "CSAFPID-0346", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-2ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2)", "product_id": "CSAFPID-0347", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-2ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2)", "product_id": "CSAFPID-0348", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-2JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2)", "product_id": "CSAFPID-0349", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-2JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2)", "product_id": "CSAFPID-0350", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-4ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2)", "product_id": "CSAFPID-0351", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-4ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2)", "product_id": "CSAFPID-0352", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-4JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2)", "product_id": "CSAFPID-0353", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-4JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2)", "product_id": "CSAFPID-0354", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-1ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2)", "product_id": "CSAFPID-0355", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-1ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2)", "product_id": "CSAFPID-0356", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-1JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2)", "product_id": "CSAFPID-0357", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-1JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2)", "product_id": "CSAFPID-0358", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-3ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2)", "product_id": "CSAFPID-0359", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-3ER2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2)", "product_id": "CSAFPID-0360", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG00-3JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2)", "product_id": "CSAFPID-0361", "product_identification_helper": { "model_numbers": [ "6GK5324-4GG10-3JR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2)", "product_id": "CSAFPID-0362", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-1AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG10-1AR2)", "product_id": "CSAFPID-0363", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG10-1AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG10-1AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2)", "product_id": "CSAFPID-0364", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-1HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG10-1HR2)", "product_id": "CSAFPID-0365", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG10-1HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG10-1HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2)", "product_id": "CSAFPID-0366", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG10-3AR2)", "product_id": "CSAFPID-0367", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG10-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG10-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2)", "product_id": "CSAFPID-0368", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-3HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG10-3HR2)", "product_id": "CSAFPID-0369", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG10-3HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG10-3HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2)", "product_id": "CSAFPID-0370", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG00-1CR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG10-1CR2)", "product_id": "CSAFPID-0371", "product_identification_helper": { "model_numbers": [ "6GK5324-4QG10-1CR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG10-1CR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2)", "product_id": "CSAFPID-0372", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-1AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2)", "product_id": "CSAFPID-0373", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-1AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2)", "product_id": "CSAFPID-0374", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-1HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2)", "product_id": "CSAFPID-0375", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-1HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2)", "product_id": "CSAFPID-0376", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2)", "product_id": "CSAFPID-0377", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2)", "product_id": "CSAFPID-0378", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-3HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2)", "product_id": "CSAFPID-0379", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-3HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2)", "product_id": "CSAFPID-0380", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG00-1CR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2)", "product_id": "CSAFPID-0381", "product_identification_helper": { "model_numbers": [ "6GK5324-0GG10-1CR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3)", "product_id": "CSAFPID-0382", "product_identification_helper": { "model_numbers": [ "6GK5324-0BA00-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3)", "product_id": "CSAFPID-0383", "product_identification_helper": { "model_numbers": [ "6GK5324-0BA00-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3)", "product_id": "CSAFPID-0384", "product_identification_helper": { "model_numbers": [ "6GK5326-2QS00-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3)", "product_id": "CSAFPID-0385", "product_identification_helper": { "model_numbers": [ "6GK5326-2QS00-3RR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3)", "product_id": "CSAFPID-0386", "product_identification_helper": { "model_numbers": [ "6GK5328-4FS00-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3)", "product_id": "CSAFPID-0387", "product_identification_helper": { "model_numbers": [ "6GK5328-4FS00-3RR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3)", "product_id": "CSAFPID-0388", "product_identification_helper": { "model_numbers": [ "6GK5328-4FS00-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3)", "product_id": "CSAFPID-0389", "product_identification_helper": { "model_numbers": [ "6GK5328-4FS00-2RR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3)", "product_id": "CSAFPID-0390", "product_identification_helper": { "model_numbers": [ "6GK5328-4SS00-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3)", "product_id": "CSAFPID-0391", "product_identification_helper": { "model_numbers": [ "6GK5328-4SS00-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2)", "product_id": "CSAFPID-0392", "product_identification_helper": { "model_numbers": [ "6GK5524-8GS00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2)", "product_id": "CSAFPID-0393", "product_identification_helper": { "model_numbers": [ "6GK5524-8GR00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2)", "product_id": "CSAFPID-0394", "product_identification_helper": { "model_numbers": [ "6GK5524-8GS00-4AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2)", "product_id": "CSAFPID-0395", "product_identification_helper": { "model_numbers": [ "6GK5524-8GR00-4AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2)", "product_id": "CSAFPID-0396", "product_identification_helper": { "model_numbers": [ "6GK5524-8GS00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2)", "product_id": "CSAFPID-0397", "product_identification_helper": { "model_numbers": [ "6GK5524-8GR00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2)", "product_id": "CSAFPID-0398", "product_identification_helper": { "model_numbers": [ "6GK5526-8GS00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2)", "product_id": "CSAFPID-0399", "product_identification_helper": { "model_numbers": [ "6GK5526-8GR00-3AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2)", "product_id": "CSAFPID-0400", "product_identification_helper": { "model_numbers": [ "6GK5526-8GS00-4AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2)", "product_id": "CSAFPID-0401", "product_identification_helper": { "model_numbers": [ "6GK5526-8GR00-4AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2)", "product_id": "CSAFPID-0402", "product_identification_helper": { "model_numbers": [ "6GK5526-8GS00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2)", "product_id": "CSAFPID-0403", "product_identification_helper": { "model_numbers": [ "6GK5526-8GR00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2)", "product_id": "CSAFPID-0404", "product_identification_helper": { "model_numbers": [ "6GK5528-0AA00-2HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2)", "product_id": "CSAFPID-0405", "product_identification_helper": { "model_numbers": [ "6GK5528-0AR00-2HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2)", "product_id": "CSAFPID-0406", "product_identification_helper": { "model_numbers": [ "6GK5528-0AA00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2)", "product_id": "CSAFPID-0407", "product_identification_helper": { "model_numbers": [ "6GK5528-0AR00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2)", "product_id": "CSAFPID-0408", "product_identification_helper": { "model_numbers": [ "6GK5552-0AA00-2HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2)", "product_id": "CSAFPID-0409", "product_identification_helper": { "model_numbers": [ "6GK5552-0AR00-2HR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2)", "product_id": "CSAFPID-0410", "product_identification_helper": { "model_numbers": [ "6GK5552-0AR00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2)", "product_id": "CSAFPID-0411", "product_identification_helper": { "model_numbers": [ "6GK5552-0AA00-2AR2" ] } } } ], "category": "product_name", "name": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3)", "product_id": "CSAFPID-0412", "product_identification_helper": { "model_numbers": [ "6GK5334-2TS01-2ER3" ] } } } ], "category": "product_name", "name": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3)", "product_id": "CSAFPID-0413", "product_identification_helper": { "model_numbers": [ "6GK5334-2TS01-4AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3)", "product_id": "CSAFPID-0414", "product_identification_helper": { "model_numbers": [ "6GK5334-3TS01-4AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3)", "product_id": "CSAFPID-0415", "product_identification_helper": { "model_numbers": [ "6GK5334-2TS01-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3)", "product_id": "CSAFPID-0416", "product_identification_helper": { "model_numbers": [ "6GK5334-3TS01-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3)", "product_id": "CSAFPID-0417", "product_identification_helper": { "model_numbers": [ "6GK5334-2TS01-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3)", "product_id": "CSAFPID-0418", "product_identification_helper": { "model_numbers": [ "6GK5334-3TS01-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SINEC INS", "product_id": "CSAFPID-0419" } } ], "category": "product_name", "name": "SINEC INS" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3)", "product_id": "CSAFPID-0420", "product_identification_helper": { "model_numbers": [ "6AG1308-2FL10-4AA3" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2)", "product_id": "CSAFPID-0421", "product_identification_helper": { "model_numbers": [ "6AG1206-2BB00-7AC2" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2)", "product_id": "CSAFPID-0422", "product_identification_helper": { "model_numbers": [ "6AG1206-2BS00-7AC2" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2)", "product_id": "CSAFPID-0423", "product_identification_helper": { "model_numbers": [ "6AG1208-0BA00-7AC2" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2)", "product_id": "CSAFPID-0424", "product_identification_helper": { "model_numbers": [ "6AG1216-4BS00-7AC2" ] } } } ], "category": "product_name", "name": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "notes": [ { "category": "summary", "text": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify responses Access-Reject or Access-Accept using a chosen-prefix collision attack against MD5 Response Authenticator signature.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0081", "CSAFPID-0082", "CSAFPID-0083", "CSAFPID-0084", "CSAFPID-0085", "CSAFPID-0086", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041", "CSAFPID-0042", "CSAFPID-0043", "CSAFPID-0044", "CSAFPID-0045", "CSAFPID-0046", "CSAFPID-0047", "CSAFPID-0048", "CSAFPID-0049", "CSAFPID-0050", "CSAFPID-0051", "CSAFPID-0052", "CSAFPID-0087", "CSAFPID-0088", "CSAFPID-0089", "CSAFPID-0090", "CSAFPID-0091", "CSAFPID-0092", "CSAFPID-0093", "CSAFPID-0094", "CSAFPID-0053", "CSAFPID-0054", "CSAFPID-0055", "CSAFPID-0056", "CSAFPID-0057", "CSAFPID-0058", "CSAFPID-0059", "CSAFPID-0060", "CSAFPID-0061", "CSAFPID-0062", "CSAFPID-0063", "CSAFPID-0064", "CSAFPID-0065", "CSAFPID-0066", "CSAFPID-0067", "CSAFPID-0068", "CSAFPID-0069", "CSAFPID-0070", "CSAFPID-0071", "CSAFPID-0072", "CSAFPID-0073", "CSAFPID-0074", "CSAFPID-0075", "CSAFPID-0076", "CSAFPID-0077", "CSAFPID-0078", "CSAFPID-0079", "CSAFPID-0080", "CSAFPID-0103", "CSAFPID-0104", "CSAFPID-0105", "CSAFPID-0106", "CSAFPID-0107", "CSAFPID-0108", "CSAFPID-0109", "CSAFPID-0110", "CSAFPID-0111", "CSAFPID-0112", "CSAFPID-0113", "CSAFPID-0114", "CSAFPID-0115", "CSAFPID-0116", "CSAFPID-0117", "CSAFPID-0118", "CSAFPID-0119", "CSAFPID-0120", "CSAFPID-0121", "CSAFPID-0122", "CSAFPID-0123", "CSAFPID-0124", "CSAFPID-0125", "CSAFPID-0126", "CSAFPID-0127", "CSAFPID-0128", "CSAFPID-0095", "CSAFPID-0096", "CSAFPID-0097", "CSAFPID-0098", "CSAFPID-0099", "CSAFPID-0100", "CSAFPID-0101", "CSAFPID-0102", "CSAFPID-0129", "CSAFPID-0130", "CSAFPID-0133", "CSAFPID-0134", "CSAFPID-0131", "CSAFPID-0132", "CSAFPID-0135", "CSAFPID-0136", "CSAFPID-0137", "CSAFPID-0138", "CSAFPID-0139", "CSAFPID-0140", "CSAFPID-0141", "CSAFPID-0143", "CSAFPID-0142", "CSAFPID-0144", "CSAFPID-0145", "CSAFPID-0146", "CSAFPID-0147", "CSAFPID-0148", "CSAFPID-0149", "CSAFPID-0150", "CSAFPID-0151", "CSAFPID-0152", "CSAFPID-0153", "CSAFPID-0154", "CSAFPID-0155", "CSAFPID-0156", "CSAFPID-0157", "CSAFPID-0158", "CSAFPID-0159", "CSAFPID-0160", "CSAFPID-0161", "CSAFPID-0162", "CSAFPID-0163", "CSAFPID-0164", "CSAFPID-0214", "CSAFPID-0215", "CSAFPID-0216", "CSAFPID-0217", "CSAFPID-0218", "CSAFPID-0219", "CSAFPID-0165", "CSAFPID-0166", "CSAFPID-0167", "CSAFPID-0168", "CSAFPID-0169", "CSAFPID-0170", "CSAFPID-0171", "CSAFPID-0172", "CSAFPID-0173", "CSAFPID-0174", "CSAFPID-0175", "CSAFPID-0176", "CSAFPID-0177", "CSAFPID-0178", "CSAFPID-0179", "CSAFPID-0180", "CSAFPID-0181", "CSAFPID-0182", "CSAFPID-0183", "CSAFPID-0184", "CSAFPID-0185", "CSAFPID-0186", "CSAFPID-0187", "CSAFPID-0188", "CSAFPID-0189", "CSAFPID-0190", "CSAFPID-0191", "CSAFPID-0192", "CSAFPID-0193", "CSAFPID-0194", "CSAFPID-0195", "CSAFPID-0196", "CSAFPID-0197", "CSAFPID-0198", "CSAFPID-0199", "CSAFPID-0200", "CSAFPID-0201", "CSAFPID-0202", "CSAFPID-0203", "CSAFPID-0204", "CSAFPID-0205", "CSAFPID-0206", "CSAFPID-0207", "CSAFPID-0208", "CSAFPID-0209", "CSAFPID-0210", "CSAFPID-0211", "CSAFPID-0212", "CSAFPID-0213", "CSAFPID-0220", "CSAFPID-0221", "CSAFPID-0222", "CSAFPID-0223", "CSAFPID-0224", "CSAFPID-0225", "CSAFPID-0226", "CSAFPID-0227", "CSAFPID-0228", "CSAFPID-0229", "CSAFPID-0230", "CSAFPID-0231", "CSAFPID-0232", "CSAFPID-0233", "CSAFPID-0234", "CSAFPID-0235", "CSAFPID-0243", "CSAFPID-0242", "CSAFPID-0241", "CSAFPID-0240", "CSAFPID-0239", "CSAFPID-0238", "CSAFPID-0237", "CSAFPID-0236", "CSAFPID-0244", "CSAFPID-0245", "CSAFPID-0253", "CSAFPID-0252", "CSAFPID-0251", "CSAFPID-0250", "CSAFPID-0249", "CSAFPID-0248", "CSAFPID-0247", "CSAFPID-0246", "CSAFPID-0254", "CSAFPID-0255", "CSAFPID-0256", "CSAFPID-0257", "CSAFPID-0258", "CSAFPID-0259", "CSAFPID-0260", "CSAFPID-0261", "CSAFPID-0262", "CSAFPID-0263", "CSAFPID-0264", "CSAFPID-0265", "CSAFPID-0266", "CSAFPID-0267", "CSAFPID-0268", "CSAFPID-0269", "CSAFPID-0270", "CSAFPID-0271", "CSAFPID-0272", "CSAFPID-0273", "CSAFPID-0274", "CSAFPID-0275", "CSAFPID-0276", "CSAFPID-0277", "CSAFPID-0278", "CSAFPID-0279", "CSAFPID-0280", "CSAFPID-0281", "CSAFPID-0282", "CSAFPID-0283", "CSAFPID-0284", "CSAFPID-0285", "CSAFPID-0286", "CSAFPID-0287", "CSAFPID-0288", "CSAFPID-0289", "CSAFPID-0290", "CSAFPID-0291", "CSAFPID-0292", "CSAFPID-0293", "CSAFPID-0294", "CSAFPID-0295", "CSAFPID-0296", "CSAFPID-0297", "CSAFPID-0298", "CSAFPID-0299", "CSAFPID-0300", "CSAFPID-0301", "CSAFPID-0302", "CSAFPID-0303", "CSAFPID-0304", "CSAFPID-0305", "CSAFPID-0306", "CSAFPID-0307", "CSAFPID-0308", "CSAFPID-0309", "CSAFPID-0310", "CSAFPID-0311", "CSAFPID-0312", "CSAFPID-0313", "CSAFPID-0314", "CSAFPID-0315", "CSAFPID-0316", "CSAFPID-0317", "CSAFPID-0318", "CSAFPID-0319", "CSAFPID-0320", "CSAFPID-0321", "CSAFPID-0322", "CSAFPID-0323", "CSAFPID-0324", "CSAFPID-0325", "CSAFPID-0326", "CSAFPID-0327", "CSAFPID-0328", "CSAFPID-0329", "CSAFPID-0330", "CSAFPID-0331", "CSAFPID-0332", "CSAFPID-0333", "CSAFPID-0334", "CSAFPID-0335", "CSAFPID-0336", "CSAFPID-0337", "CSAFPID-0338", "CSAFPID-0339", "CSAFPID-0340", "CSAFPID-0341", "CSAFPID-0342", "CSAFPID-0343", "CSAFPID-0344", "CSAFPID-0345", "CSAFPID-0376", "CSAFPID-0377", "CSAFPID-0378", "CSAFPID-0379", "CSAFPID-0372", "CSAFPID-0373", "CSAFPID-0374", "CSAFPID-0375", "CSAFPID-0380", "CSAFPID-0381", "CSAFPID-0358", "CSAFPID-0359", "CSAFPID-0360", "CSAFPID-0361", "CSAFPID-0354", "CSAFPID-0355", "CSAFPID-0356", "CSAFPID-0357", "CSAFPID-0350", "CSAFPID-0351", "CSAFPID-0352", "CSAFPID-0353", "CSAFPID-0346", "CSAFPID-0347", "CSAFPID-0348", "CSAFPID-0349", "CSAFPID-0366", "CSAFPID-0367", "CSAFPID-0368", "CSAFPID-0369", "CSAFPID-0362", "CSAFPID-0363", "CSAFPID-0364", "CSAFPID-0365", "CSAFPID-0370", "CSAFPID-0371", "CSAFPID-0382", "CSAFPID-0383", "CSAFPID-0384", "CSAFPID-0385", "CSAFPID-0388", "CSAFPID-0389", "CSAFPID-0386", "CSAFPID-0387", "CSAFPID-0390", "CSAFPID-0391", "CSAFPID-0392", "CSAFPID-0393", "CSAFPID-0396", "CSAFPID-0397", "CSAFPID-0394", "CSAFPID-0395", "CSAFPID-0398", "CSAFPID-0399", "CSAFPID-0402", "CSAFPID-0403", "CSAFPID-0400", "CSAFPID-0401", "CSAFPID-0406", "CSAFPID-0405", "CSAFPID-0404", "CSAFPID-0407", "CSAFPID-0411", "CSAFPID-0410", "CSAFPID-0408", "CSAFPID-0409", "CSAFPID-0412", "CSAFPID-0418", "CSAFPID-0417", "CSAFPID-0416", "CSAFPID-0415", "CSAFPID-0414", "CSAFPID-0413", "CSAFPID-0419", "CSAFPID-0420", "CSAFPID-0421", "CSAFPID-0422", "CSAFPID-0423", "CSAFPID-0424" ] }, "remediations": [ { "category": "mitigation", "details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0081", "CSAFPID-0082", "CSAFPID-0083", "CSAFPID-0084", "CSAFPID-0085", "CSAFPID-0086", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041", "CSAFPID-0042", "CSAFPID-0043", "CSAFPID-0044", "CSAFPID-0045", "CSAFPID-0046", "CSAFPID-0047", "CSAFPID-0048", "CSAFPID-0049", "CSAFPID-0050", "CSAFPID-0051", "CSAFPID-0052", "CSAFPID-0087", "CSAFPID-0088", "CSAFPID-0089", "CSAFPID-0090", "CSAFPID-0091", "CSAFPID-0092", "CSAFPID-0093", "CSAFPID-0094", "CSAFPID-0053", "CSAFPID-0054", "CSAFPID-0055", "CSAFPID-0056", "CSAFPID-0057", "CSAFPID-0058", "CSAFPID-0059", "CSAFPID-0060", "CSAFPID-0061", "CSAFPID-0062", "CSAFPID-0063", "CSAFPID-0064", "CSAFPID-0065", "CSAFPID-0066", "CSAFPID-0067", "CSAFPID-0068", "CSAFPID-0069", "CSAFPID-0070", "CSAFPID-0071", "CSAFPID-0072", "CSAFPID-0073", "CSAFPID-0074", "CSAFPID-0075", "CSAFPID-0076", "CSAFPID-0077", "CSAFPID-0078", "CSAFPID-0079", "CSAFPID-0080", "CSAFPID-0103", "CSAFPID-0104", "CSAFPID-0105", "CSAFPID-0106", "CSAFPID-0107", "CSAFPID-0108", "CSAFPID-0109", "CSAFPID-0110", "CSAFPID-0111", "CSAFPID-0112", "CSAFPID-0113", "CSAFPID-0114", "CSAFPID-0115", "CSAFPID-0116", "CSAFPID-0117", "CSAFPID-0118", "CSAFPID-0119", "CSAFPID-0120", "CSAFPID-0121", "CSAFPID-0122", "CSAFPID-0123", "CSAFPID-0124", "CSAFPID-0125", "CSAFPID-0126", "CSAFPID-0127", "CSAFPID-0128", "CSAFPID-0095", "CSAFPID-0096", "CSAFPID-0097", "CSAFPID-0098", "CSAFPID-0099", "CSAFPID-0100", "CSAFPID-0101", "CSAFPID-0102", "CSAFPID-0129", "CSAFPID-0130", "CSAFPID-0133", "CSAFPID-0134", "CSAFPID-0131", "CSAFPID-0132", "CSAFPID-0135", "CSAFPID-0136", "CSAFPID-0137", "CSAFPID-0138", "CSAFPID-0139", "CSAFPID-0140", "CSAFPID-0141", "CSAFPID-0143", "CSAFPID-0142", "CSAFPID-0144", "CSAFPID-0145", "CSAFPID-0146", "CSAFPID-0147", "CSAFPID-0148", "CSAFPID-0149", "CSAFPID-0150", "CSAFPID-0151", "CSAFPID-0152", "CSAFPID-0153", "CSAFPID-0154", "CSAFPID-0155", "CSAFPID-0156", "CSAFPID-0157", "CSAFPID-0158", "CSAFPID-0159", "CSAFPID-0160", "CSAFPID-0161", "CSAFPID-0162", "CSAFPID-0163", "CSAFPID-0164", "CSAFPID-0214", "CSAFPID-0215", "CSAFPID-0216", "CSAFPID-0217", "CSAFPID-0218", "CSAFPID-0219", "CSAFPID-0165", "CSAFPID-0166", "CSAFPID-0167", "CSAFPID-0168", "CSAFPID-0169", "CSAFPID-0170", "CSAFPID-0171", "CSAFPID-0172", "CSAFPID-0173", "CSAFPID-0174", "CSAFPID-0175", "CSAFPID-0176", "CSAFPID-0177", "CSAFPID-0178", "CSAFPID-0179", "CSAFPID-0180", "CSAFPID-0181", "CSAFPID-0182", "CSAFPID-0183", "CSAFPID-0184", "CSAFPID-0185", "CSAFPID-0186", "CSAFPID-0187", "CSAFPID-0188", "CSAFPID-0189", "CSAFPID-0190", "CSAFPID-0191", "CSAFPID-0192", "CSAFPID-0193", "CSAFPID-0194", "CSAFPID-0195", "CSAFPID-0196", "CSAFPID-0197", "CSAFPID-0198", "CSAFPID-0199", "CSAFPID-0200", "CSAFPID-0201", "CSAFPID-0202", "CSAFPID-0203", "CSAFPID-0204", "CSAFPID-0205", "CSAFPID-0206", "CSAFPID-0207", "CSAFPID-0208", "CSAFPID-0209", "CSAFPID-0210", "CSAFPID-0211", "CSAFPID-0212", "CSAFPID-0213", "CSAFPID-0220", "CSAFPID-0221", "CSAFPID-0222", "CSAFPID-0223", "CSAFPID-0224", "CSAFPID-0225", "CSAFPID-0226", "CSAFPID-0227", "CSAFPID-0228", "CSAFPID-0229", "CSAFPID-0230", "CSAFPID-0231", "CSAFPID-0232", "CSAFPID-0233", "CSAFPID-0234", "CSAFPID-0235", "CSAFPID-0243", "CSAFPID-0242", "CSAFPID-0241", "CSAFPID-0240", "CSAFPID-0239", "CSAFPID-0238", "CSAFPID-0237", "CSAFPID-0236", "CSAFPID-0244", "CSAFPID-0245", "CSAFPID-0253", "CSAFPID-0252", "CSAFPID-0251", "CSAFPID-0250", "CSAFPID-0249", "CSAFPID-0248", "CSAFPID-0247", "CSAFPID-0246", "CSAFPID-0254", "CSAFPID-0255", "CSAFPID-0256", "CSAFPID-0257", "CSAFPID-0258", "CSAFPID-0259", "CSAFPID-0260", "CSAFPID-0261", "CSAFPID-0262", "CSAFPID-0263", "CSAFPID-0264", "CSAFPID-0265", "CSAFPID-0266", "CSAFPID-0267", "CSAFPID-0268", "CSAFPID-0269", "CSAFPID-0270", "CSAFPID-0271", "CSAFPID-0272", "CSAFPID-0273", "CSAFPID-0274", "CSAFPID-0275", "CSAFPID-0276", "CSAFPID-0277", "CSAFPID-0278", "CSAFPID-0279", "CSAFPID-0280", "CSAFPID-0281", "CSAFPID-0282", "CSAFPID-0283", "CSAFPID-0284", "CSAFPID-0285", "CSAFPID-0286", "CSAFPID-0287", "CSAFPID-0288", "CSAFPID-0289", "CSAFPID-0290", "CSAFPID-0291", "CSAFPID-0292", "CSAFPID-0293", "CSAFPID-0294", "CSAFPID-0295", "CSAFPID-0296", "CSAFPID-0297", "CSAFPID-0298", "CSAFPID-0299", "CSAFPID-0300", "CSAFPID-0301", "CSAFPID-0302", "CSAFPID-0303", "CSAFPID-0304", "CSAFPID-0305", "CSAFPID-0306", "CSAFPID-0307", "CSAFPID-0308", "CSAFPID-0309", "CSAFPID-0310", "CSAFPID-0311", "CSAFPID-0312", "CSAFPID-0313", "CSAFPID-0314", "CSAFPID-0315", "CSAFPID-0316", "CSAFPID-0317", "CSAFPID-0318", "CSAFPID-0319", "CSAFPID-0320", "CSAFPID-0321", "CSAFPID-0322", "CSAFPID-0323", "CSAFPID-0324", "CSAFPID-0325", "CSAFPID-0326", "CSAFPID-0327", "CSAFPID-0328", "CSAFPID-0329", "CSAFPID-0330", "CSAFPID-0331", "CSAFPID-0332", "CSAFPID-0333", "CSAFPID-0334", "CSAFPID-0335", "CSAFPID-0336", "CSAFPID-0337", "CSAFPID-0338", "CSAFPID-0339", "CSAFPID-0340", "CSAFPID-0341", "CSAFPID-0342", "CSAFPID-0343", "CSAFPID-0344", "CSAFPID-0345", "CSAFPID-0376", "CSAFPID-0377", "CSAFPID-0378", "CSAFPID-0379", "CSAFPID-0372", "CSAFPID-0373", "CSAFPID-0374", "CSAFPID-0375", "CSAFPID-0380", "CSAFPID-0381", "CSAFPID-0358", "CSAFPID-0359", "CSAFPID-0360", "CSAFPID-0361", "CSAFPID-0354", "CSAFPID-0355", "CSAFPID-0356", "CSAFPID-0357", "CSAFPID-0350", "CSAFPID-0351", "CSAFPID-0352", "CSAFPID-0353", "CSAFPID-0346", "CSAFPID-0347", "CSAFPID-0348", "CSAFPID-0349", "CSAFPID-0366", "CSAFPID-0367", "CSAFPID-0368", "CSAFPID-0369", "CSAFPID-0362", "CSAFPID-0363", "CSAFPID-0364", "CSAFPID-0365", "CSAFPID-0370", "CSAFPID-0371", "CSAFPID-0382", "CSAFPID-0383", "CSAFPID-0384", "CSAFPID-0385", "CSAFPID-0388", "CSAFPID-0389", "CSAFPID-0386", "CSAFPID-0387", "CSAFPID-0390", "CSAFPID-0391", "CSAFPID-0392", "CSAFPID-0393", "CSAFPID-0396", "CSAFPID-0397", "CSAFPID-0394", "CSAFPID-0395", "CSAFPID-0398", "CSAFPID-0399", "CSAFPID-0402", "CSAFPID-0403", "CSAFPID-0400", "CSAFPID-0401", "CSAFPID-0406", "CSAFPID-0405", "CSAFPID-0404", "CSAFPID-0407", "CSAFPID-0411", "CSAFPID-0410", "CSAFPID-0408", "CSAFPID-0409", "CSAFPID-0412", "CSAFPID-0418", "CSAFPID-0417", "CSAFPID-0416", "CSAFPID-0415", "CSAFPID-0414", "CSAFPID-0413", "CSAFPID-0419", "CSAFPID-0420", "CSAFPID-0421", "CSAFPID-0422", "CSAFPID-0423", "CSAFPID-0424" ] }, { "category": "mitigation", "details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0081", "CSAFPID-0082", "CSAFPID-0083", "CSAFPID-0084", "CSAFPID-0085", "CSAFPID-0086", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041", "CSAFPID-0042", "CSAFPID-0043", "CSAFPID-0044", "CSAFPID-0045", "CSAFPID-0046", "CSAFPID-0047", "CSAFPID-0048", "CSAFPID-0049", "CSAFPID-0050", "CSAFPID-0051", "CSAFPID-0052", "CSAFPID-0087", "CSAFPID-0088", "CSAFPID-0089", "CSAFPID-0090", "CSAFPID-0091", "CSAFPID-0092", "CSAFPID-0093", "CSAFPID-0094", "CSAFPID-0053", "CSAFPID-0054", "CSAFPID-0055", "CSAFPID-0056", "CSAFPID-0057", "CSAFPID-0058", "CSAFPID-0059", "CSAFPID-0060", "CSAFPID-0061", "CSAFPID-0062", "CSAFPID-0063", "CSAFPID-0064", "CSAFPID-0065", "CSAFPID-0066", "CSAFPID-0067", "CSAFPID-0068", "CSAFPID-0069", "CSAFPID-0070", "CSAFPID-0071", "CSAFPID-0072", "CSAFPID-0073", "CSAFPID-0074", "CSAFPID-0075", "CSAFPID-0076", "CSAFPID-0077", "CSAFPID-0078", "CSAFPID-0079", "CSAFPID-0080", "CSAFPID-0103", "CSAFPID-0104", "CSAFPID-0105", "CSAFPID-0106", "CSAFPID-0107", "CSAFPID-0108", "CSAFPID-0109", "CSAFPID-0110", "CSAFPID-0111", "CSAFPID-0112", "CSAFPID-0113", "CSAFPID-0114", "CSAFPID-0115", "CSAFPID-0116", "CSAFPID-0117", "CSAFPID-0118", "CSAFPID-0119", "CSAFPID-0120", "CSAFPID-0121", "CSAFPID-0122", "CSAFPID-0123", "CSAFPID-0124", "CSAFPID-0125", "CSAFPID-0126", "CSAFPID-0127", "CSAFPID-0128", "CSAFPID-0095", "CSAFPID-0096", "CSAFPID-0097", "CSAFPID-0098", "CSAFPID-0099", "CSAFPID-0100", "CSAFPID-0101", "CSAFPID-0102", "CSAFPID-0129", "CSAFPID-0130", "CSAFPID-0133", "CSAFPID-0134", "CSAFPID-0131", "CSAFPID-0132", "CSAFPID-0135", "CSAFPID-0136", "CSAFPID-0137", "CSAFPID-0138", "CSAFPID-0139", "CSAFPID-0140", "CSAFPID-0141", "CSAFPID-0143", "CSAFPID-0142", "CSAFPID-0144", "CSAFPID-0145", "CSAFPID-0146", "CSAFPID-0147", "CSAFPID-0148", "CSAFPID-0149", "CSAFPID-0150", "CSAFPID-0151", "CSAFPID-0152", "CSAFPID-0153", "CSAFPID-0154", "CSAFPID-0155", "CSAFPID-0156", "CSAFPID-0157", "CSAFPID-0158", "CSAFPID-0159", "CSAFPID-0160", "CSAFPID-0161", "CSAFPID-0162", "CSAFPID-0163", "CSAFPID-0164", "CSAFPID-0214", "CSAFPID-0215", "CSAFPID-0216", "CSAFPID-0217", "CSAFPID-0218", "CSAFPID-0219", "CSAFPID-0165", "CSAFPID-0166", "CSAFPID-0167", "CSAFPID-0168", "CSAFPID-0169", "CSAFPID-0170", "CSAFPID-0171", "CSAFPID-0172", "CSAFPID-0173", "CSAFPID-0174", "CSAFPID-0175", "CSAFPID-0176", "CSAFPID-0177", "CSAFPID-0178", "CSAFPID-0179", "CSAFPID-0180", "CSAFPID-0181", "CSAFPID-0182", "CSAFPID-0183", "CSAFPID-0184", "CSAFPID-0185", "CSAFPID-0186", "CSAFPID-0187", "CSAFPID-0188", "CSAFPID-0189", "CSAFPID-0190", "CSAFPID-0191", "CSAFPID-0192", "CSAFPID-0193", "CSAFPID-0194", "CSAFPID-0195", "CSAFPID-0196", "CSAFPID-0197", "CSAFPID-0198", "CSAFPID-0199", "CSAFPID-0200", "CSAFPID-0201", "CSAFPID-0202", "CSAFPID-0203", "CSAFPID-0204", "CSAFPID-0205", "CSAFPID-0206", "CSAFPID-0207", "CSAFPID-0208", "CSAFPID-0209", "CSAFPID-0210", "CSAFPID-0211", "CSAFPID-0212", "CSAFPID-0213", "CSAFPID-0220", "CSAFPID-0221", "CSAFPID-0222", "CSAFPID-0223", "CSAFPID-0224", "CSAFPID-0225", "CSAFPID-0226", "CSAFPID-0227", "CSAFPID-0228", "CSAFPID-0229", "CSAFPID-0230", "CSAFPID-0231", "CSAFPID-0232", "CSAFPID-0233", "CSAFPID-0234", "CSAFPID-0235", "CSAFPID-0243", "CSAFPID-0242", "CSAFPID-0241", "CSAFPID-0240", "CSAFPID-0239", "CSAFPID-0238", "CSAFPID-0237", "CSAFPID-0236", "CSAFPID-0244", "CSAFPID-0245", "CSAFPID-0253", "CSAFPID-0252", "CSAFPID-0251", "CSAFPID-0250", "CSAFPID-0249", "CSAFPID-0248", "CSAFPID-0247", "CSAFPID-0246", "CSAFPID-0254", "CSAFPID-0255", "CSAFPID-0256", "CSAFPID-0257", "CSAFPID-0258", "CSAFPID-0259", "CSAFPID-0260", "CSAFPID-0261", "CSAFPID-0262", "CSAFPID-0263", "CSAFPID-0264", "CSAFPID-0265", "CSAFPID-0266", "CSAFPID-0267", "CSAFPID-0268", "CSAFPID-0269", "CSAFPID-0270", "CSAFPID-0271", "CSAFPID-0272", "CSAFPID-0273", "CSAFPID-0274", "CSAFPID-0275", "CSAFPID-0276", "CSAFPID-0277", "CSAFPID-0278", "CSAFPID-0279", "CSAFPID-0280", "CSAFPID-0281", "CSAFPID-0282", "CSAFPID-0283", "CSAFPID-0284", "CSAFPID-0285", "CSAFPID-0286", "CSAFPID-0287", "CSAFPID-0288", "CSAFPID-0289", "CSAFPID-0290", "CSAFPID-0291", "CSAFPID-0292", "CSAFPID-0293", "CSAFPID-0294", "CSAFPID-0295", "CSAFPID-0296", "CSAFPID-0297", "CSAFPID-0298", "CSAFPID-0299", "CSAFPID-0300", "CSAFPID-0301", "CSAFPID-0302", "CSAFPID-0303", "CSAFPID-0304", "CSAFPID-0305", "CSAFPID-0306", "CSAFPID-0307", "CSAFPID-0308", "CSAFPID-0309", "CSAFPID-0310", "CSAFPID-0311", "CSAFPID-0312", "CSAFPID-0313", "CSAFPID-0314", "CSAFPID-0315", "CSAFPID-0316", "CSAFPID-0317", "CSAFPID-0318", "CSAFPID-0319", "CSAFPID-0320", "CSAFPID-0321", "CSAFPID-0322", "CSAFPID-0323", "CSAFPID-0324", "CSAFPID-0325", "CSAFPID-0326", "CSAFPID-0327", "CSAFPID-0328", "CSAFPID-0329", "CSAFPID-0330", "CSAFPID-0331", "CSAFPID-0332", "CSAFPID-0333", "CSAFPID-0334", "CSAFPID-0335", "CSAFPID-0336", "CSAFPID-0337", "CSAFPID-0338", "CSAFPID-0339", "CSAFPID-0340", "CSAFPID-0341", "CSAFPID-0342", "CSAFPID-0343", "CSAFPID-0344", "CSAFPID-0345", "CSAFPID-0376", "CSAFPID-0377", "CSAFPID-0378", "CSAFPID-0379", "CSAFPID-0372", "CSAFPID-0373", "CSAFPID-0374", "CSAFPID-0375", "CSAFPID-0380", "CSAFPID-0381", "CSAFPID-0358", "CSAFPID-0359", "CSAFPID-0360", "CSAFPID-0361", "CSAFPID-0354", "CSAFPID-0355", "CSAFPID-0356", "CSAFPID-0357", "CSAFPID-0350", "CSAFPID-0351", "CSAFPID-0352", "CSAFPID-0353", "CSAFPID-0346", "CSAFPID-0347", "CSAFPID-0348", "CSAFPID-0349", "CSAFPID-0366", "CSAFPID-0367", "CSAFPID-0368", "CSAFPID-0369", "CSAFPID-0362", "CSAFPID-0363", "CSAFPID-0364", "CSAFPID-0365", "CSAFPID-0370", "CSAFPID-0371", "CSAFPID-0382", "CSAFPID-0383", "CSAFPID-0384", "CSAFPID-0385", "CSAFPID-0388", "CSAFPID-0389", "CSAFPID-0386", "CSAFPID-0387", "CSAFPID-0390", "CSAFPID-0391", "CSAFPID-0392", "CSAFPID-0393", "CSAFPID-0396", "CSAFPID-0397", "CSAFPID-0394", "CSAFPID-0395", "CSAFPID-0398", "CSAFPID-0399", "CSAFPID-0402", "CSAFPID-0403", "CSAFPID-0400", "CSAFPID-0401", "CSAFPID-0406", "CSAFPID-0405", "CSAFPID-0404", "CSAFPID-0407", "CSAFPID-0411", "CSAFPID-0410", "CSAFPID-0408", "CSAFPID-0409", "CSAFPID-0412", "CSAFPID-0418", "CSAFPID-0417", "CSAFPID-0416", "CSAFPID-0415", "CSAFPID-0414", "CSAFPID-0413", "CSAFPID-0419", "CSAFPID-0420", "CSAFPID-0421", "CSAFPID-0422", "CSAFPID-0423", "CSAFPID-0424" ] }, { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0419" ] }, { "category": "none_available", "details": "Currently no fix is available", "product_ids": [ "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0081", "CSAFPID-0082", "CSAFPID-0083", "CSAFPID-0084", "CSAFPID-0085", "CSAFPID-0086", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041", "CSAFPID-0042", "CSAFPID-0043", "CSAFPID-0044", "CSAFPID-0045", "CSAFPID-0046", "CSAFPID-0047", "CSAFPID-0048", "CSAFPID-0049", "CSAFPID-0050", "CSAFPID-0051", "CSAFPID-0052", "CSAFPID-0087", "CSAFPID-0088", "CSAFPID-0089", "CSAFPID-0090", "CSAFPID-0091", "CSAFPID-0092", "CSAFPID-0093", "CSAFPID-0094", "CSAFPID-0053", "CSAFPID-0054", "CSAFPID-0055", "CSAFPID-0056", "CSAFPID-0057", "CSAFPID-0058", "CSAFPID-0059", "CSAFPID-0060", "CSAFPID-0061", "CSAFPID-0062", "CSAFPID-0063", "CSAFPID-0064", "CSAFPID-0065", "CSAFPID-0066", "CSAFPID-0067", "CSAFPID-0068", "CSAFPID-0069", "CSAFPID-0070", "CSAFPID-0071", "CSAFPID-0072", "CSAFPID-0073", "CSAFPID-0074", "CSAFPID-0075", "CSAFPID-0076", "CSAFPID-0077", "CSAFPID-0078", "CSAFPID-0079", "CSAFPID-0080", "CSAFPID-0103", "CSAFPID-0104", "CSAFPID-0105", "CSAFPID-0106", "CSAFPID-0107", "CSAFPID-0108", "CSAFPID-0109", "CSAFPID-0110", "CSAFPID-0111", "CSAFPID-0112", "CSAFPID-0113", "CSAFPID-0114", "CSAFPID-0115", "CSAFPID-0116", "CSAFPID-0117", "CSAFPID-0118", "CSAFPID-0119", "CSAFPID-0120", "CSAFPID-0121", "CSAFPID-0122", "CSAFPID-0123", "CSAFPID-0124", "CSAFPID-0125", "CSAFPID-0126", "CSAFPID-0127", "CSAFPID-0128", "CSAFPID-0095", "CSAFPID-0096", "CSAFPID-0097", "CSAFPID-0098", "CSAFPID-0099", "CSAFPID-0100", "CSAFPID-0101", "CSAFPID-0102", "CSAFPID-0129", "CSAFPID-0130", "CSAFPID-0133", "CSAFPID-0134", "CSAFPID-0131", "CSAFPID-0132", "CSAFPID-0135", "CSAFPID-0136", "CSAFPID-0137", "CSAFPID-0138", "CSAFPID-0139", "CSAFPID-0140", "CSAFPID-0141", "CSAFPID-0143", "CSAFPID-0142", "CSAFPID-0144", "CSAFPID-0145", "CSAFPID-0146", "CSAFPID-0147", "CSAFPID-0148", "CSAFPID-0149", "CSAFPID-0150", "CSAFPID-0151", "CSAFPID-0152", "CSAFPID-0153", "CSAFPID-0154", "CSAFPID-0155", "CSAFPID-0156", "CSAFPID-0157", "CSAFPID-0158", "CSAFPID-0159", "CSAFPID-0160", "CSAFPID-0161", "CSAFPID-0162", "CSAFPID-0163", "CSAFPID-0164", "CSAFPID-0214", "CSAFPID-0215", "CSAFPID-0216", "CSAFPID-0217", "CSAFPID-0218", "CSAFPID-0219", "CSAFPID-0165", "CSAFPID-0166", "CSAFPID-0167", "CSAFPID-0168", "CSAFPID-0169", "CSAFPID-0170", "CSAFPID-0171", "CSAFPID-0172", "CSAFPID-0173", "CSAFPID-0174", "CSAFPID-0175", "CSAFPID-0176", "CSAFPID-0177", "CSAFPID-0178", "CSAFPID-0179", "CSAFPID-0180", "CSAFPID-0181", "CSAFPID-0182", "CSAFPID-0183", "CSAFPID-0184", "CSAFPID-0185", "CSAFPID-0186", "CSAFPID-0187", "CSAFPID-0188", "CSAFPID-0189", "CSAFPID-0190", "CSAFPID-0191", "CSAFPID-0192", "CSAFPID-0193", "CSAFPID-0194", "CSAFPID-0195", "CSAFPID-0196", "CSAFPID-0197", "CSAFPID-0198", "CSAFPID-0199", "CSAFPID-0200", "CSAFPID-0201", "CSAFPID-0202", "CSAFPID-0203", "CSAFPID-0204", "CSAFPID-0205", "CSAFPID-0206", "CSAFPID-0207", "CSAFPID-0208", "CSAFPID-0209", "CSAFPID-0210", "CSAFPID-0211", "CSAFPID-0212", "CSAFPID-0213", "CSAFPID-0220", "CSAFPID-0221", "CSAFPID-0222", "CSAFPID-0223", "CSAFPID-0224", "CSAFPID-0225", "CSAFPID-0226", "CSAFPID-0227", "CSAFPID-0228", "CSAFPID-0229", "CSAFPID-0230", "CSAFPID-0231", "CSAFPID-0232", "CSAFPID-0233", "CSAFPID-0234", "CSAFPID-0235", "CSAFPID-0243", "CSAFPID-0242", "CSAFPID-0241", "CSAFPID-0240", "CSAFPID-0239", "CSAFPID-0238", "CSAFPID-0237", "CSAFPID-0236", "CSAFPID-0244", "CSAFPID-0245", "CSAFPID-0253", "CSAFPID-0252", "CSAFPID-0251", "CSAFPID-0250", "CSAFPID-0249", "CSAFPID-0248", "CSAFPID-0247", "CSAFPID-0246", "CSAFPID-0254", "CSAFPID-0255", "CSAFPID-0256", "CSAFPID-0257", "CSAFPID-0258", "CSAFPID-0259", "CSAFPID-0260", "CSAFPID-0261", "CSAFPID-0262", "CSAFPID-0263", "CSAFPID-0264", "CSAFPID-0265", "CSAFPID-0266", "CSAFPID-0267", "CSAFPID-0268", "CSAFPID-0269", "CSAFPID-0270", "CSAFPID-0271", "CSAFPID-0272", "CSAFPID-0273", "CSAFPID-0274", "CSAFPID-0275", "CSAFPID-0276", "CSAFPID-0277", "CSAFPID-0278", "CSAFPID-0279", "CSAFPID-0280", "CSAFPID-0281", "CSAFPID-0282", "CSAFPID-0283", "CSAFPID-0284", "CSAFPID-0285", "CSAFPID-0286", "CSAFPID-0287", "CSAFPID-0288", "CSAFPID-0289", "CSAFPID-0290", "CSAFPID-0291", "CSAFPID-0292", "CSAFPID-0293", "CSAFPID-0294", "CSAFPID-0295", "CSAFPID-0296", "CSAFPID-0297", "CSAFPID-0298", "CSAFPID-0299", "CSAFPID-0300", "CSAFPID-0301", "CSAFPID-0302", "CSAFPID-0303", "CSAFPID-0304", "CSAFPID-0305", "CSAFPID-0306", "CSAFPID-0307", "CSAFPID-0308", "CSAFPID-0309", "CSAFPID-0310", "CSAFPID-0311", "CSAFPID-0312", "CSAFPID-0313", "CSAFPID-0314", "CSAFPID-0315", "CSAFPID-0316", "CSAFPID-0317", "CSAFPID-0318", "CSAFPID-0319", "CSAFPID-0320", "CSAFPID-0321", "CSAFPID-0322", "CSAFPID-0323", "CSAFPID-0324", "CSAFPID-0325", "CSAFPID-0326", "CSAFPID-0327", "CSAFPID-0328", "CSAFPID-0329", "CSAFPID-0330", "CSAFPID-0331", "CSAFPID-0332", "CSAFPID-0333", "CSAFPID-0334", "CSAFPID-0335", "CSAFPID-0336", "CSAFPID-0337", "CSAFPID-0338", "CSAFPID-0339", "CSAFPID-0340", "CSAFPID-0341", "CSAFPID-0342", "CSAFPID-0343", "CSAFPID-0344", "CSAFPID-0345", "CSAFPID-0376", "CSAFPID-0377", "CSAFPID-0378", "CSAFPID-0379", "CSAFPID-0372", "CSAFPID-0373", "CSAFPID-0374", "CSAFPID-0375", "CSAFPID-0380", "CSAFPID-0381", "CSAFPID-0358", "CSAFPID-0359", "CSAFPID-0360", "CSAFPID-0361", "CSAFPID-0354", "CSAFPID-0355", "CSAFPID-0356", "CSAFPID-0357", "CSAFPID-0350", "CSAFPID-0351", "CSAFPID-0352", "CSAFPID-0353", "CSAFPID-0346", "CSAFPID-0347", "CSAFPID-0348", "CSAFPID-0349", "CSAFPID-0366", "CSAFPID-0367", "CSAFPID-0368", "CSAFPID-0369", "CSAFPID-0362", "CSAFPID-0363", "CSAFPID-0364", "CSAFPID-0365", "CSAFPID-0370", "CSAFPID-0371", "CSAFPID-0382", "CSAFPID-0383", "CSAFPID-0384", "CSAFPID-0385", "CSAFPID-0388", "CSAFPID-0389", "CSAFPID-0386", "CSAFPID-0387", "CSAFPID-0390", "CSAFPID-0391", "CSAFPID-0392", "CSAFPID-0393", "CSAFPID-0396", "CSAFPID-0397", "CSAFPID-0394", "CSAFPID-0395", "CSAFPID-0398", "CSAFPID-0399", "CSAFPID-0402", "CSAFPID-0403", "CSAFPID-0400", "CSAFPID-0401", "CSAFPID-0406", "CSAFPID-0405", "CSAFPID-0404", "CSAFPID-0407", "CSAFPID-0411", "CSAFPID-0410", "CSAFPID-0408", "CSAFPID-0409", "CSAFPID-0412", "CSAFPID-0418", "CSAFPID-0417", "CSAFPID-0416", "CSAFPID-0415", "CSAFPID-0414", "CSAFPID-0413", "CSAFPID-0420", "CSAFPID-0421", "CSAFPID-0422", "CSAFPID-0423", "CSAFPID-0424" ] }, { "category": "vendor_fix", "details": "Update to V5.6 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109976555/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-0012", "CSAFPID-0013", "CSAFPID-0014", "CSAFPID-0015", "CSAFPID-0010", "CSAFPID-0011", "CSAFPID-0016", "CSAFPID-0017", "CSAFPID-0018", "CSAFPID-0019", "CSAFPID-0020", "CSAFPID-0021", "CSAFPID-0022", "CSAFPID-0023", "CSAFPID-0024", "CSAFPID-0025", "CSAFPID-0026", "CSAFPID-0027", "CSAFPID-0028", "CSAFPID-0029", "CSAFPID-0030", "CSAFPID-0031", "CSAFPID-0032", "CSAFPID-0033", "CSAFPID-0034", "CSAFPID-0035", "CSAFPID-0036", "CSAFPID-0081", "CSAFPID-0082", "CSAFPID-0083", "CSAFPID-0084", "CSAFPID-0085", "CSAFPID-0086", "CSAFPID-0037", "CSAFPID-0038", "CSAFPID-0039", "CSAFPID-0040", "CSAFPID-0041", "CSAFPID-0042", "CSAFPID-0043", "CSAFPID-0044", "CSAFPID-0045", "CSAFPID-0046", "CSAFPID-0047", "CSAFPID-0048", "CSAFPID-0049", "CSAFPID-0050", "CSAFPID-0051", "CSAFPID-0052", "CSAFPID-0087", "CSAFPID-0088", "CSAFPID-0089", "CSAFPID-0090", "CSAFPID-0091", "CSAFPID-0092", "CSAFPID-0093", "CSAFPID-0094", "CSAFPID-0053", "CSAFPID-0054", "CSAFPID-0055", "CSAFPID-0056", "CSAFPID-0057", "CSAFPID-0058", "CSAFPID-0059", "CSAFPID-0060", "CSAFPID-0061", "CSAFPID-0062", "CSAFPID-0063", "CSAFPID-0064", "CSAFPID-0065", "CSAFPID-0066", "CSAFPID-0067", "CSAFPID-0068", "CSAFPID-0069", "CSAFPID-0070", "CSAFPID-0071", "CSAFPID-0072", "CSAFPID-0073", "CSAFPID-0074", "CSAFPID-0075", "CSAFPID-0076", "CSAFPID-0077", "CSAFPID-0078", "CSAFPID-0079", "CSAFPID-0080", "CSAFPID-0103", "CSAFPID-0104", "CSAFPID-0105", "CSAFPID-0106", "CSAFPID-0107", "CSAFPID-0108", "CSAFPID-0109", "CSAFPID-0110", "CSAFPID-0111", "CSAFPID-0112", "CSAFPID-0113", "CSAFPID-0114", "CSAFPID-0115", "CSAFPID-0116", "CSAFPID-0117", "CSAFPID-0118", "CSAFPID-0119", "CSAFPID-0120", "CSAFPID-0121", "CSAFPID-0122", "CSAFPID-0123", "CSAFPID-0124", "CSAFPID-0125", "CSAFPID-0126", "CSAFPID-0127", "CSAFPID-0128", "CSAFPID-0095", "CSAFPID-0096", "CSAFPID-0097", "CSAFPID-0098", "CSAFPID-0099", "CSAFPID-0100", "CSAFPID-0101", "CSAFPID-0102", "CSAFPID-0129", "CSAFPID-0130", "CSAFPID-0133", "CSAFPID-0134", "CSAFPID-0131", "CSAFPID-0132", "CSAFPID-0135", "CSAFPID-0136", "CSAFPID-0137", "CSAFPID-0138", "CSAFPID-0139", "CSAFPID-0140", "CSAFPID-0141", "CSAFPID-0143", "CSAFPID-0142", "CSAFPID-0144", "CSAFPID-0145", "CSAFPID-0146", "CSAFPID-0147", "CSAFPID-0148", "CSAFPID-0149", "CSAFPID-0150", "CSAFPID-0151", "CSAFPID-0152", "CSAFPID-0153", "CSAFPID-0154", "CSAFPID-0155", "CSAFPID-0156", "CSAFPID-0157", "CSAFPID-0158", "CSAFPID-0159", "CSAFPID-0160", "CSAFPID-0161", "CSAFPID-0162", "CSAFPID-0163", "CSAFPID-0164", "CSAFPID-0214", "CSAFPID-0215", "CSAFPID-0216", "CSAFPID-0217", "CSAFPID-0218", "CSAFPID-0219", "CSAFPID-0165", "CSAFPID-0166", "CSAFPID-0167", "CSAFPID-0168", "CSAFPID-0169", "CSAFPID-0170", "CSAFPID-0171", "CSAFPID-0172", "CSAFPID-0173", "CSAFPID-0174", "CSAFPID-0175", "CSAFPID-0176", "CSAFPID-0177", "CSAFPID-0178", "CSAFPID-0179", "CSAFPID-0180", "CSAFPID-0181", "CSAFPID-0182", "CSAFPID-0183", "CSAFPID-0184", "CSAFPID-0185", "CSAFPID-0186", "CSAFPID-0187", "CSAFPID-0188", "CSAFPID-0189", "CSAFPID-0190", "CSAFPID-0191", "CSAFPID-0192", "CSAFPID-0193", "CSAFPID-0194", "CSAFPID-0195", "CSAFPID-0196", "CSAFPID-0197", "CSAFPID-0198", "CSAFPID-0199", "CSAFPID-0200", "CSAFPID-0201", "CSAFPID-0202", "CSAFPID-0203", "CSAFPID-0204", "CSAFPID-0205", "CSAFPID-0206", "CSAFPID-0207", "CSAFPID-0208", "CSAFPID-0209", "CSAFPID-0210", "CSAFPID-0211", "CSAFPID-0212", "CSAFPID-0213", "CSAFPID-0220", "CSAFPID-0221", "CSAFPID-0222", "CSAFPID-0223", "CSAFPID-0224", "CSAFPID-0225", "CSAFPID-0226", "CSAFPID-0227", "CSAFPID-0228", "CSAFPID-0229", "CSAFPID-0230", "CSAFPID-0231", "CSAFPID-0232", "CSAFPID-0233", "CSAFPID-0234", "CSAFPID-0235", "CSAFPID-0243", "CSAFPID-0242", "CSAFPID-0241", "CSAFPID-0240", "CSAFPID-0239", "CSAFPID-0238", "CSAFPID-0237", "CSAFPID-0236", "CSAFPID-0244", "CSAFPID-0245", "CSAFPID-0253", "CSAFPID-0252", "CSAFPID-0251", "CSAFPID-0250", "CSAFPID-0249", "CSAFPID-0248", "CSAFPID-0247", "CSAFPID-0246", "CSAFPID-0254", "CSAFPID-0255", "CSAFPID-0256", "CSAFPID-0257", "CSAFPID-0258", "CSAFPID-0259", "CSAFPID-0260", "CSAFPID-0261", "CSAFPID-0262", "CSAFPID-0263", "CSAFPID-0264", "CSAFPID-0265", "CSAFPID-0266", "CSAFPID-0267", "CSAFPID-0268", "CSAFPID-0269", "CSAFPID-0270", "CSAFPID-0271", "CSAFPID-0272", "CSAFPID-0273", "CSAFPID-0274", "CSAFPID-0275", "CSAFPID-0276", "CSAFPID-0277", "CSAFPID-0278", "CSAFPID-0279", "CSAFPID-0280", "CSAFPID-0281", "CSAFPID-0282", "CSAFPID-0283", "CSAFPID-0284", "CSAFPID-0285", "CSAFPID-0286", "CSAFPID-0287", "CSAFPID-0288", "CSAFPID-0289", "CSAFPID-0290", "CSAFPID-0291", "CSAFPID-0292", "CSAFPID-0293", "CSAFPID-0294", "CSAFPID-0295", "CSAFPID-0296", "CSAFPID-0297", "CSAFPID-0298", "CSAFPID-0299", "CSAFPID-0300", "CSAFPID-0301", "CSAFPID-0302", "CSAFPID-0303", "CSAFPID-0304", "CSAFPID-0305", "CSAFPID-0306", "CSAFPID-0307", "CSAFPID-0308", "CSAFPID-0309", "CSAFPID-0310", "CSAFPID-0311", "CSAFPID-0312", "CSAFPID-0313", "CSAFPID-0314", "CSAFPID-0315", "CSAFPID-0316", "CSAFPID-0317", "CSAFPID-0318", "CSAFPID-0319", "CSAFPID-0320", "CSAFPID-0321", "CSAFPID-0322", "CSAFPID-0323", "CSAFPID-0324", "CSAFPID-0325", "CSAFPID-0326", "CSAFPID-0327", "CSAFPID-0328", "CSAFPID-0329", "CSAFPID-0330", "CSAFPID-0331", "CSAFPID-0332", "CSAFPID-0333", "CSAFPID-0334", "CSAFPID-0335", "CSAFPID-0336", "CSAFPID-0337", "CSAFPID-0338", "CSAFPID-0339", "CSAFPID-0340", "CSAFPID-0341", "CSAFPID-0342", "CSAFPID-0343", "CSAFPID-0344", "CSAFPID-0345", "CSAFPID-0376", "CSAFPID-0377", "CSAFPID-0378", "CSAFPID-0379", "CSAFPID-0372", "CSAFPID-0373", "CSAFPID-0374", "CSAFPID-0375", "CSAFPID-0380", "CSAFPID-0381", "CSAFPID-0358", "CSAFPID-0359", "CSAFPID-0360", "CSAFPID-0361", "CSAFPID-0354", "CSAFPID-0355", "CSAFPID-0356", "CSAFPID-0357", "CSAFPID-0350", "CSAFPID-0351", "CSAFPID-0352", "CSAFPID-0353", "CSAFPID-0346", "CSAFPID-0347", "CSAFPID-0348", "CSAFPID-0349", "CSAFPID-0366", "CSAFPID-0367", "CSAFPID-0368", "CSAFPID-0369", "CSAFPID-0362", "CSAFPID-0363", "CSAFPID-0364", "CSAFPID-0365", "CSAFPID-0370", "CSAFPID-0371", "CSAFPID-0382", "CSAFPID-0383", "CSAFPID-0384", "CSAFPID-0385", "CSAFPID-0388", "CSAFPID-0389", "CSAFPID-0386", "CSAFPID-0387", "CSAFPID-0390", "CSAFPID-0391", "CSAFPID-0392", "CSAFPID-0393", "CSAFPID-0396", "CSAFPID-0397", "CSAFPID-0394", "CSAFPID-0395", "CSAFPID-0398", "CSAFPID-0399", "CSAFPID-0402", "CSAFPID-0403", "CSAFPID-0400", "CSAFPID-0401", "CSAFPID-0406", "CSAFPID-0405", "CSAFPID-0404", "CSAFPID-0407", "CSAFPID-0411", "CSAFPID-0410", "CSAFPID-0408", "CSAFPID-0409", "CSAFPID-0412", "CSAFPID-0418", "CSAFPID-0417", "CSAFPID-0416", "CSAFPID-0415", "CSAFPID-0414", "CSAFPID-0413", "CSAFPID-0419", "CSAFPID-0420", "CSAFPID-0421", "CSAFPID-0422", "CSAFPID-0423", "CSAFPID-0424" ] } ], "title": "CVE-2024-3596" } ] }
ICSA-24-193-11
Vulnerability from csaf_cisa
Published
2024-07-09 00:00
Modified
2024-11-12 00:00
Summary
Siemens RUGGEDCOM APE 1808
Notes
Summary
Palo Alto Networks has published [1] information on vulnerabilities in PAN-OS. This advisory lists the related Siemens Industrial products affected by these vulnerabilities.
Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available. Customers are advised to consult and implement the workarounds provided in Palo Alto Networks' upstream security notifications.
[1]
https://security.paloaltonetworks.com/
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Advisory Conversion Disclaimer
This CISA CSAF advisory was converted from Siemens ProductCERT's CSAF advisory.
Critical infrastructure sectors
Multiple
Countries/areas deployed
Worldwide
Company headquarters location
Germany
Recommended Practices
CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.
Recommended Practices
Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.
Recommended Practices
Locate control system networks and remote devices behind firewalls and isolate them from business networks.
Recommended Practices
When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.
Recommended Practices
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Recommended Practices
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Recommended Practices
Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Palo Alto Networks has published [1] information on vulnerabilities in PAN-OS. This advisory lists the related Siemens Industrial products affected by these vulnerabilities.\n\nSiemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available. Customers are advised to consult and implement the workarounds provided in Palo Alto Networks\u0027 upstream security notifications.\n\n[1] \nhttps://security.paloaltonetworks.com/", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-364175: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-364175.json" }, { "category": "self", "summary": "SSA-364175: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-364175.html" }, { "category": "self", "summary": "ICS Advisory ICSA-24-193-11 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-193-11.json" }, { "category": "self", "summary": "ICS Advisory ICSA-24-193-11 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-193-11" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens RUGGEDCOM APE 1808", "tracking": { "current_release_date": "2024-11-12T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-24-193-11", "initial_release_date": "2024-07-09T00:00:00.000000Z", "revision_history": [ { "date": "2024-07-09T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2024-08-13T00:00:00.000000Z", "legacy_version": "1.1", "number": "2", "summary": "Added newly published CVE-2024-5913 and CVE-2024-3596" }, { "date": "2024-10-08T00:00:00.000000Z", "legacy_version": "1.2", "number": "3", "summary": "Added CVE-2023-48795, CVE-2024-3596, CVE-2024-5913 and fix version information for Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 devices" }, { "date": "2024-11-12T00:00:00.000000Z", "legacy_version": "1.3", "number": "4", "summary": "Added newly published CVE-2024-9468 and CVE-2024-9471. Added CVSSv4.0 vector to CVE-2024-5913" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM APE1808", "product_id": "CSAFPID-0001" } }, { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM APE1808", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "RUGGEDCOM APE1808" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "summary", "text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust; and there could be effects on Bitvise SSH through 9.31.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "remediations": [ { "category": "vendor_fix", "details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information", "product_ids": [ "CSAFPID-0001" ] }, { "category": "workaround", "details": "CVE-2023-48795: Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation \nhttps://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "notes": [ { "category": "summary", "text": "RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify responses Access-Reject or Access-Accept using a chosen-prefix collision attack against MD5 Response Authenticator signature.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0002" ] }, "remediations": [ { "category": "mitigation", "details": "Restrict access to the networks where RADIUS messages are exchanged (e.g., send RADIUS traffic via management network or a dedicated VLAN)", "product_ids": [ "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Con\ufb01gure the RADIUS server to require the presence of a Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it", "product_ids": [ "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information", "product_ids": [ "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0002" ] } ], "title": "CVE-2024-3596" }, { "cve": "CVE-2024-5913", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An improper input validation vulnerability in Palo Alto Networks PAN-OS software enables an attacker with the ability to tamper with the physical file system to elevate privileges.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0002" ] }, "remediations": [ { "category": "vendor_fix", "details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information", "product_ids": [ "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0002" ] } ], "title": "CVE-2024-5913" }, { "cve": "CVE-2024-9468", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0002" ] }, "remediations": [ { "category": "vendor_fix", "details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information", "product_ids": [ "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0002" ] } ], "title": "CVE-2024-9468" }, { "cve": "CVE-2024-9471", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "A privilege escalation (PE) vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated PAN-OS administrator with restricted privileges to use a compromised XML API key to perform actions as a higher privileged PAN-OS administrator. For example, an administrator with \"Virtual system administrator (read-only)\" access could use an XML API key of a \"Virtual system administrator\" to perform write operations on the virtual system configuration even though they should be limited to read-only operations.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0002" ] }, "remediations": [ { "category": "vendor_fix", "details": "Upgrade Palo Alto Networks Virtual NGFW V11.1.4-h1. Contact customer support to receive patch and update information", "product_ids": [ "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0002" ] } ], "title": "CVE-2024-9471" } ] }
gsd-2024-3596
Vulnerability from gsd
Modified
2024-04-11 05:03
Details
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Aliases
{ "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2024-3596" ], "id": "GSD-2024-3596", "modified": "2024-04-11T05:03:27.122669Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2024-3596", "STATE": "RESERVED" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." } ] } } } }
wid-sec-w-2024-1578
Vulnerability from csaf_certbund
Published
2024-07-09 22:00
Modified
2024-07-24 22:00
Summary
RADIUS: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
RADIUS ist ein Protokoll zur Authentisierung entfernter Benutzer (Remote Access Dial-In User Service).
Angriff
Ein lokaler Angreifer kann eine Schwachstelle im RADIUS Protokoll ausnutzen, um Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme
- BIOS/Firmware
- Hardware Appliance
- Linux
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "RADIUS ist ein Protokoll zur Authentisierung entfernter Benutzer (Remote Access Dial-In User Service).", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann eine Schwachstelle im RADIUS Protokoll ausnutzen, um Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware\n- Hardware Appliance\n- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1578 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1578.json" }, { "category": "self", "summary": "WID-SEC-2024-1578 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1578" }, { "category": "external", "summary": "Blast-RADIUS vom 2024-07-09", "url": "https://www.blastradius.fail/" }, { "category": "external", "summary": "CERT CC VU#456537 vom 2024-07-09", "url": "https://kb.cert.org/vuls/id/456537" }, { "category": "external", "summary": "freeradius Security vom 2024-07-09", "url": "http://freeradius.org/security/" }, { "category": "external", "summary": "LANCOM Sicherheitshinweise vom 2024-07-09", "url": "https://www.lancom-systems.de/service-support/soforthilfe/allgemeine-sicherheitshinweise/" }, { "category": "external", "summary": "Arista Security Advisory 0101 vom 2024-07-09", "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/19905-security-advisory-0101" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-C395D8FEF4 vom 2024-07-09", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-c395d8fef4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2359-1 vom 2024-07-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018908.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2366-1 vom 2024-07-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018904.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2361-1 vom 2024-07-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018906.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2367-1 vom 2024-07-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018903.html" }, { "category": "external", "summary": "Palo Alto Networks Security Advisory PAN-247511 vom 2024-07-10", "url": "https://security.paloaltonetworks.com/CVE-2024-3596" }, { "category": "external", "summary": "Cisco Security Advisories", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-radius-spoofing-july-2024-87cCDwZ3" }, { "category": "external", "summary": "Lancom Advisory", "url": "https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise" }, { "category": "external", "summary": "HPE Security Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04662en_us\u0026docLocale=en_US" }, { "category": "external", "summary": "Cisco Security Advisories", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-radius-spoofing-july-2024-87cCDwZ3" }, { "category": "external", "summary": "SonicWall Security Advisory SNWLID-2024-0014 vom 2024-07-23", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4828 vom 2024-07-24", "url": "https://access.redhat.com/errata/RHSA-2024:4828" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4829 vom 2024-07-24", "url": "https://access.redhat.com/errata/RHSA-2024:4829" }, { "category": "external", "summary": "Cisco Security Advisories", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-radius-spoofing-july-2024-87cCDwZ3" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4826 vom 2024-07-24", "url": "https://access.redhat.com/errata/RHSA-2024:4826" } ], "source_lang": "en-US", "title": "RADIUS: Schwachstelle erm\u00f6glicht Umgehen von Sicherheitsvorkehrungen", "tracking": { "current_release_date": "2024-07-24T22:00:00.000+00:00", "generator": { "date": "2024-07-25T08:32:48.766+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-1578", "initial_release_date": "2024-07-09T22:00:00.000+00:00", "revision_history": [ { "date": "2024-07-09T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-07-10T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Palo Alto Networks aufgenommen" }, { "date": "2024-07-16T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2024-07-21T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Cisco" }, { "date": "2024-07-22T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SonicWall aufgenommen" }, { "date": "2024-07-24T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "6" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Arista EOS", "product": { "name": "Arista EOS", "product_id": "T007958", "product_identification_helper": { "cpe": "cpe:/o:arista:arista_eos:-" } } }, { "category": "product_name", "name": "Arista WiFi Access Point", "product": { "name": "Arista WiFi Access Point", "product_id": "T019358", "product_identification_helper": { "cpe": "cpe:/h:arista:wifi_access_point:-" } } } ], "category": "vendor", "name": "Arista" }, { "branches": [ { "category": "product_name", "name": "Aruba ArubaOS", "product": { "name": "Aruba ArubaOS", "product_id": "T021926", "product_identification_helper": { "cpe": "cpe:/o:arubanetworks:arubaos:-" } } }, { "category": "product_name", "name": "Aruba ClearPass Policy Manager", "product": { "name": "Aruba ClearPass Policy Manager", "product_id": "T023403", "product_identification_helper": { "cpe": "cpe:/a:arubanetworks:clearpass_policy_manager:-" } } }, { "category": "product_name", "name": "Aruba EdgeConnect", "product": { "name": "Aruba EdgeConnect", "product_id": "T027755", "product_identification_helper": { "cpe": "cpe:/a:aruba:edgeconnect:-" } } } ], "category": "vendor", "name": "Aruba" }, { "branches": [ { "category": "product_name", "name": "Cisco ASA (Adaptive Security Appliance)", "product": { "name": "Cisco ASA (Adaptive Security Appliance)", "product_id": "T035033", "product_identification_helper": { "cpe": "cpe:/h:cisco:adaptive_security_appliance:-" } } }, { "category": "product_name", "name": "Cisco Application Policy Infrastructure Controller", "product": { "name": "Cisco Application Policy Infrastructure Controller", "product_id": "778219", "product_identification_helper": { "cpe": "cpe:/a:cisco:application_policy_infrastructure_controller:-" } } }, { "category": "product_name", "name": "Cisco Catalyst SD-WAN Manager", "product": { "name": "Cisco Catalyst SD-WAN Manager", "product_id": "1487015", "product_identification_helper": { "cpe": "cpe:/a:cisco:catalyst_sd-wan_manager:20.11.1.2" } } }, { "branches": [ { "category": "product_version", "name": "Management Center", "product": { "name": "Cisco Firepower Management Center", "product_id": "T016458", "product_identification_helper": { "cpe": "cpe:/a:cisco:firepower:management_center" } } }, { "category": "product_version", "name": "Device Manager", "product": { "name": "Cisco Firepower Device Manager", "product_id": "T016459", "product_identification_helper": { "cpe": "cpe:/a:cisco:firepower:device_manager" } } }, { "category": "product_version", "name": "Threat Defense", "product": { "name": "Cisco Firepower Threat Defense", "product_id": "T029736", "product_identification_helper": { "cpe": "cpe:/a:cisco:firepower:threat_defense" } } } ], "category": "product_name", "name": "Firepower" }, { "category": "product_name", "name": "Cisco IOS XE", "product": { "name": "Cisco IOS XE", "product_id": "T030538", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios_xe:-" } } }, { "category": "product_name", "name": "Cisco IOS XR", "product": { "name": "Cisco IOS XR", "product_id": "2062", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios_xr:-" } } }, { "category": "product_name", "name": "Cisco Identity Services Engine (ISE)", "product": { "name": "Cisco Identity Services Engine (ISE)", "product_id": "T000612", "product_identification_helper": { "cpe": "cpe:/a:cisco:identity_services_engine_software:-" } } }, { "category": "product_name", "name": "Cisco MDS 9000", "product": { "name": "Cisco MDS 9000", "product_id": "T001069", "product_identification_helper": { "cpe": "cpe:/o:cisco:mds_9000:-" } } }, { "branches": [ { "category": "product_version", "name": "3000", "product": { "name": "Cisco Nexus 3000", "product_id": "T003851", "product_identification_helper": { "cpe": "cpe:/h:cisco:nexus:3000" } } }, { "category": "product_version", "name": "9000", "product": { "name": "Cisco Nexus 9000", "product_id": "T003853", "product_identification_helper": { "cpe": "cpe:/h:cisco:nexus:9000" } } }, { "category": "product_version", "name": "7000", "product": { "name": "Cisco Nexus 7000", "product_id": "T009516", "product_identification_helper": { "cpe": "cpe:/h:cisco:nexus:7000" } } } ], "category": "product_name", "name": "Nexus" }, { "category": "product_name", "name": "Cisco Nexus Dashboard", "product": { "name": "Cisco Nexus Dashboard", "product_id": "1202977", "product_identification_helper": { "cpe": "cpe:/a:cisco:nexus_dashboard:-" } } }, { "branches": [ { "category": "product_name", "name": "Cisco Router", "product": { "name": "Cisco Router", "product_id": "T003258", "product_identification_helper": { "cpe": "cpe:/h:cisco:router:-" } } }, { "category": "product_version", "name": "ASR 5000", "product": { "name": "Cisco Router ASR 5000", "product_id": "T007902", "product_identification_helper": { "cpe": "cpe:/h:cisco:router:asr_5000" } } } ], "category": "product_name", "name": "Router" }, { "category": "product_name", "name": "Cisco SD-WAN", "product": { "name": "Cisco SD-WAN", "product_id": "T015770", "product_identification_helper": { "cpe": "cpe:/a:cisco:sd_wan:-" } } }, { "category": "product_name", "name": "Cisco Secure Email Gateway", "product": { "name": "Cisco Secure Email Gateway", "product_id": "1269011", "product_identification_helper": { "cpe": "cpe:/h:cisco:secure_email_gateway:-" } } }, { "category": "product_name", "name": "Cisco Secure Web Appliance", "product": { "name": "Cisco Secure Web Appliance", "product_id": "T034850", "product_identification_helper": { "cpe": "cpe:/h:cisco:secure_web_appliance:-" } } }, { "branches": [ { "category": "product_version", "name": "Central Software", "product": { "name": "Cisco Unified Computing System (UCS) Central Software", "product_id": "T021359", "product_identification_helper": { "cpe": "cpe:/h:cisco:unified_computing_system:central_software" } } }, { "category": "product_version", "name": "Manager", "product": { "name": "Cisco Unified Computing System (UCS) Manager", "product_id": "T036384", "product_identification_helper": { "cpe": "cpe:/h:cisco:unified_computing_system:manager" } } } ], "category": "product_name", "name": "Unified Computing System (UCS)" } ], "category": "vendor", "name": "Cisco" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "category": "product_name", "name": "LANCOM Access Point", "product": { "name": "LANCOM Access Point", "product_id": "T035952", "product_identification_helper": { "cpe": "cpe:/h:lancom:access_point:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.50 RU14", "product": { "name": "LANCOM LCOS \u003c10.50 RU14", "product_id": "T035940", "product_identification_helper": { "cpe": "cpe:/o:lancom:lcos:10.50_ru14" } } }, { "category": "product_version_range", "name": "\u003c10.72 RU8", "product": { "name": "LANCOM LCOS \u003c10.72 RU8", "product_id": "T035941", "product_identification_helper": { "cpe": "cpe:/o:lancom:lcos:10.72_ru8" } } }, { "category": "product_version_range", "name": "\u003c10.80 RU6", "product": { "name": "LANCOM LCOS \u003c10.80 RU6", "product_id": "T035942", "product_identification_helper": { "cpe": "cpe:/o:lancom:lcos:10.80_ru6" } } }, { "category": "product_version_range", "name": "LX \u003c6.20", "product": { "name": "LANCOM LCOS LX \u003c6.20", "product_id": "T035945", "product_identification_helper": { "cpe": "cpe:/o:lancom:lcos:6.20::lx" } } }, { "category": "product_version_range", "name": "SX \u003c3.34 SU8", "product": { "name": "LANCOM LCOS SX \u003c3.34 SU8", "product_id": "T035947", "product_identification_helper": { "cpe": "cpe:/o:lancom:lcos:3.34:su8:sx" } } }, { "category": "product_version_range", "name": "SX \u003c4.00 SU13", "product": { "name": "LANCOM LCOS SX \u003c4.00 SU13", "product_id": "T035948", "product_identification_helper": { "cpe": "cpe:/o:lancom:lcos:4.00:su13:sx" } } }, { "category": "product_version_range", "name": "SX \u003c4.20 SU3", "product": { "name": "LANCOM LCOS SX \u003c4.20 SU3", "product_id": "T035949", "product_identification_helper": { "cpe": "cpe:/o:lancom:lcos:4.20:su3:sx" } } }, { "category": "product_version_range", "name": "SX \u003c4.30", "product": { "name": "LANCOM LCOS SX \u003c4.30", "product_id": "T035950", "product_identification_helper": { "cpe": "cpe:/o:lancom:lcos:4.30::sx" } } }, { "category": "product_version_range", "name": "SX \u003c5.20 SU9", "product": { "name": "LANCOM LCOS SX \u003c5.20 SU9", "product_id": "T035951", "product_identification_helper": { "cpe": "cpe:/o:lancom:lcos:5.20:su9:sx" } } } ], "category": "product_name", "name": "LCOS" }, { "category": "product_name", "name": "LANCOM Router", "product": { "name": "LANCOM Router", "product_id": "T019305", "product_identification_helper": { "cpe": "cpe:/h:lancom:router:-" } } }, { "category": "product_name", "name": "LANCOM Switch", "product": { "name": "LANCOM Switch", "product_id": "T035953", "product_identification_helper": { "cpe": "cpe:/h:lancom:switch:-" } } } ], "category": "vendor", "name": "LANCOM" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c3.0.27", "product": { "name": "Open Source FreeRADIUS \u003c3.0.27", "product_id": "T035938", "product_identification_helper": { "cpe": "cpe:/a:freeradius:freeradius:3.0.27" } } }, { "category": "product_version_range", "name": "\u003c3.2.5", "product": { "name": "Open Source FreeRADIUS \u003c3.2.5", "product_id": "T035939", "product_identification_helper": { "cpe": "cpe:/a:freeradius:freeradius:3.2.5" } } } ], "category": "product_name", "name": "FreeRADIUS" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c11.2", "product": { "name": "PaloAlto Networks PAN-OS \u003c11.2", "product_id": "T036074", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:11.2" } } }, { "category": "product_version_range", "name": "\u003c11.1.3", "product": { "name": "PaloAlto Networks PAN-OS \u003c11.1.3", "product_id": "T036075", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:11.1.3" } } }, { "category": "product_version_range", "name": "\u003c11.0.4-h4", "product": { "name": "PaloAlto Networks PAN-OS \u003c11.0.4-h4", "product_id": "T036076", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:11.0.4-h4" } } }, { "category": "product_version_range", "name": "\u003c10.2.10", "product": { "name": "PaloAlto Networks PAN-OS \u003c10.2.10", "product_id": "T036077", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:10.2.10" } } }, { "category": "product_version_range", "name": "\u003c10.1.14", "product": { "name": "PaloAlto Networks PAN-OS \u003c10.1.14", "product_id": "T036078", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:10.1.14" } } }, { "category": "product_version_range", "name": "\u003c9.1.19", "product": { "name": "PaloAlto Networks PAN-OS \u003c9.1.19", "product_id": "T036079", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:9.1.19" } } } ], "category": "product_name", "name": "PAN-OS" } ], "category": "vendor", "name": "PaloAlto Networks" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "SonicWall Global VPN Client", "product": { "name": "SonicWall Global VPN Client", "product_id": "829390", "product_identification_helper": { "cpe": "cpe:/a:sonicwall:global_vpn_client:-" } } } ], "category": "vendor", "name": "SonicWall" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle im RADIUS Protokoll (RFC 2865). Diese erm\u00f6glicht es, jeden beliebigen Benutzer zur Authentifizierung zu zwingen und ihm eine beliebige Berechtigung (VLAN usw.) zu erteilen. Durch die \u00c4nderung bestimmter Access-Request-Meldungen kann ein lokaler Angreifer diese Schwachstelle ausnutzen, um einen Mallory-in-the-middle (MitM)-Angriff durchzuf\u00fchren oder um unter bestimmten Umst\u00e4nden Integrit\u00e4tspr\u00fcfungen zu umgehen." } ], "product_status": { "known_affected": [ "829390", "T035953", "T035952", "67646", "T016459", "T016458", "T021926", "1202977", "T035033", "T007902", "T036384", "1487015", "T019358", "T000612", "T021359", "T027755", "T029736", "T030538", "T001069", "1269011", "T003851", "T003258", "T009516", "T003853", "T007958", "T036076", "2062", "T034850", "T036077", "74185", "T036078", "T015770", "T036079", "T036074", "T036075", "T002207", "T019305", "T023403", "778219" ] }, "release_date": "2024-07-09T22:00:00Z", "title": "CVE-2024-3596" } ] }
WID-SEC-W-2024-1578
Vulnerability from csaf_certbund
Published
2024-07-09 22:00
Modified
2024-07-24 22:00
Summary
RADIUS: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
RADIUS ist ein Protokoll zur Authentisierung entfernter Benutzer (Remote Access Dial-In User Service).
Angriff
Ein lokaler Angreifer kann eine Schwachstelle im RADIUS Protokoll ausnutzen, um Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme
- BIOS/Firmware
- Hardware Appliance
- Linux
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "RADIUS ist ein Protokoll zur Authentisierung entfernter Benutzer (Remote Access Dial-In User Service).", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann eine Schwachstelle im RADIUS Protokoll ausnutzen, um Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware\n- Hardware Appliance\n- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1578 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1578.json" }, { "category": "self", "summary": "WID-SEC-2024-1578 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1578" }, { "category": "external", "summary": "Blast-RADIUS vom 2024-07-09", "url": "https://www.blastradius.fail/" }, { "category": "external", "summary": "CERT CC VU#456537 vom 2024-07-09", "url": "https://kb.cert.org/vuls/id/456537" }, { "category": "external", "summary": "freeradius Security vom 2024-07-09", "url": "http://freeradius.org/security/" }, { "category": "external", "summary": "LANCOM Sicherheitshinweise vom 2024-07-09", "url": "https://www.lancom-systems.de/service-support/soforthilfe/allgemeine-sicherheitshinweise/" }, { "category": "external", "summary": "Arista Security Advisory 0101 vom 2024-07-09", "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/19905-security-advisory-0101" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-C395D8FEF4 vom 2024-07-09", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-c395d8fef4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2359-1 vom 2024-07-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018908.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2366-1 vom 2024-07-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018904.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2361-1 vom 2024-07-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018906.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2367-1 vom 2024-07-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018903.html" }, { "category": "external", "summary": "Palo Alto Networks Security Advisory PAN-247511 vom 2024-07-10", "url": "https://security.paloaltonetworks.com/CVE-2024-3596" }, { "category": "external", "summary": "Cisco Security Advisories", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-radius-spoofing-july-2024-87cCDwZ3" }, { "category": "external", "summary": "Lancom Advisory", "url": "https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise" }, { "category": "external", "summary": "HPE Security Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04662en_us\u0026docLocale=en_US" }, { "category": "external", "summary": "Cisco Security Advisories", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-radius-spoofing-july-2024-87cCDwZ3" }, { "category": "external", "summary": "SonicWall Security Advisory SNWLID-2024-0014 vom 2024-07-23", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4828 vom 2024-07-24", "url": "https://access.redhat.com/errata/RHSA-2024:4828" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4829 vom 2024-07-24", "url": "https://access.redhat.com/errata/RHSA-2024:4829" }, { "category": "external", "summary": "Cisco Security Advisories", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-radius-spoofing-july-2024-87cCDwZ3" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4826 vom 2024-07-24", "url": "https://access.redhat.com/errata/RHSA-2024:4826" } ], "source_lang": "en-US", "title": "RADIUS: Schwachstelle erm\u00f6glicht Umgehen von Sicherheitsvorkehrungen", "tracking": { "current_release_date": "2024-07-24T22:00:00.000+00:00", "generator": { "date": "2024-07-25T08:32:48.766+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-1578", "initial_release_date": "2024-07-09T22:00:00.000+00:00", "revision_history": [ { "date": "2024-07-09T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-07-10T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Palo Alto Networks aufgenommen" }, { "date": "2024-07-16T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2024-07-21T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Cisco" }, { "date": "2024-07-22T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SonicWall aufgenommen" }, { "date": "2024-07-24T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "6" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Arista EOS", "product": { "name": "Arista EOS", "product_id": "T007958", "product_identification_helper": { "cpe": "cpe:/o:arista:arista_eos:-" } } }, { "category": "product_name", "name": "Arista WiFi Access Point", "product": { "name": "Arista WiFi Access Point", "product_id": "T019358", "product_identification_helper": { "cpe": "cpe:/h:arista:wifi_access_point:-" } } } ], "category": "vendor", "name": "Arista" }, { "branches": [ { "category": "product_name", "name": "Aruba ArubaOS", "product": { "name": "Aruba ArubaOS", "product_id": "T021926", "product_identification_helper": { "cpe": "cpe:/o:arubanetworks:arubaos:-" } } }, { "category": "product_name", "name": "Aruba ClearPass Policy Manager", "product": { "name": "Aruba ClearPass Policy Manager", "product_id": "T023403", "product_identification_helper": { "cpe": "cpe:/a:arubanetworks:clearpass_policy_manager:-" } } }, { "category": "product_name", "name": "Aruba EdgeConnect", "product": { "name": "Aruba EdgeConnect", "product_id": "T027755", "product_identification_helper": { "cpe": "cpe:/a:aruba:edgeconnect:-" } } } ], "category": "vendor", "name": "Aruba" }, { "branches": [ { "category": "product_name", "name": "Cisco ASA (Adaptive Security Appliance)", "product": { "name": "Cisco ASA (Adaptive Security Appliance)", "product_id": "T035033", "product_identification_helper": { "cpe": "cpe:/h:cisco:adaptive_security_appliance:-" } } }, { "category": "product_name", "name": "Cisco Application Policy Infrastructure Controller", "product": { "name": "Cisco Application Policy Infrastructure Controller", "product_id": "778219", "product_identification_helper": { "cpe": "cpe:/a:cisco:application_policy_infrastructure_controller:-" } } }, { "category": "product_name", "name": "Cisco Catalyst SD-WAN Manager", "product": { "name": "Cisco Catalyst SD-WAN Manager", "product_id": "1487015", "product_identification_helper": { "cpe": "cpe:/a:cisco:catalyst_sd-wan_manager:20.11.1.2" } } }, { "branches": [ { "category": "product_version", "name": "Management Center", "product": { "name": "Cisco Firepower Management Center", "product_id": "T016458", "product_identification_helper": { "cpe": "cpe:/a:cisco:firepower:management_center" } } }, { "category": "product_version", "name": "Device Manager", "product": { "name": "Cisco Firepower Device Manager", "product_id": "T016459", "product_identification_helper": { "cpe": "cpe:/a:cisco:firepower:device_manager" } } }, { "category": "product_version", "name": "Threat Defense", "product": { "name": "Cisco Firepower Threat Defense", "product_id": "T029736", "product_identification_helper": { "cpe": "cpe:/a:cisco:firepower:threat_defense" } } } ], "category": "product_name", "name": "Firepower" }, { "category": "product_name", "name": "Cisco IOS XE", "product": { "name": "Cisco IOS XE", "product_id": "T030538", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios_xe:-" } } }, { "category": "product_name", "name": "Cisco IOS XR", "product": { "name": "Cisco IOS XR", "product_id": "2062", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios_xr:-" } } }, { "category": "product_name", "name": "Cisco Identity Services Engine (ISE)", "product": { "name": "Cisco Identity Services Engine (ISE)", "product_id": "T000612", "product_identification_helper": { "cpe": "cpe:/a:cisco:identity_services_engine_software:-" } } }, { "category": "product_name", "name": "Cisco MDS 9000", "product": { "name": "Cisco MDS 9000", "product_id": "T001069", "product_identification_helper": { "cpe": "cpe:/o:cisco:mds_9000:-" } } }, { "branches": [ { "category": "product_version", "name": "3000", "product": { "name": "Cisco Nexus 3000", "product_id": "T003851", "product_identification_helper": { "cpe": "cpe:/h:cisco:nexus:3000" } } }, { "category": "product_version", "name": "9000", "product": { "name": "Cisco Nexus 9000", "product_id": "T003853", "product_identification_helper": { "cpe": "cpe:/h:cisco:nexus:9000" } } }, { "category": "product_version", "name": "7000", "product": { "name": "Cisco Nexus 7000", "product_id": "T009516", "product_identification_helper": { "cpe": "cpe:/h:cisco:nexus:7000" } } } ], "category": "product_name", "name": "Nexus" }, { "category": "product_name", "name": "Cisco Nexus Dashboard", "product": { "name": "Cisco Nexus Dashboard", "product_id": "1202977", "product_identification_helper": { "cpe": "cpe:/a:cisco:nexus_dashboard:-" } } }, { "branches": [ { "category": "product_name", "name": "Cisco Router", "product": { "name": "Cisco Router", "product_id": "T003258", "product_identification_helper": { "cpe": "cpe:/h:cisco:router:-" } } }, { "category": "product_version", "name": "ASR 5000", "product": { "name": "Cisco Router ASR 5000", "product_id": "T007902", "product_identification_helper": { "cpe": "cpe:/h:cisco:router:asr_5000" } } } ], "category": "product_name", "name": "Router" }, { "category": "product_name", "name": "Cisco SD-WAN", "product": { "name": "Cisco SD-WAN", "product_id": "T015770", "product_identification_helper": { "cpe": "cpe:/a:cisco:sd_wan:-" } } }, { "category": "product_name", "name": "Cisco Secure Email Gateway", "product": { "name": "Cisco Secure Email Gateway", "product_id": "1269011", "product_identification_helper": { "cpe": "cpe:/h:cisco:secure_email_gateway:-" } } }, { "category": "product_name", "name": "Cisco Secure Web Appliance", "product": { "name": "Cisco Secure Web Appliance", "product_id": "T034850", "product_identification_helper": { "cpe": "cpe:/h:cisco:secure_web_appliance:-" } } }, { "branches": [ { "category": "product_version", "name": "Central Software", "product": { "name": "Cisco Unified Computing System (UCS) Central Software", "product_id": "T021359", "product_identification_helper": { "cpe": "cpe:/h:cisco:unified_computing_system:central_software" } } }, { "category": "product_version", "name": "Manager", "product": { "name": "Cisco Unified Computing System (UCS) Manager", "product_id": "T036384", "product_identification_helper": { "cpe": "cpe:/h:cisco:unified_computing_system:manager" } } } ], "category": "product_name", "name": "Unified Computing System (UCS)" } ], "category": "vendor", "name": "Cisco" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "category": "product_name", "name": "LANCOM Access Point", "product": { "name": "LANCOM Access Point", "product_id": "T035952", "product_identification_helper": { "cpe": "cpe:/h:lancom:access_point:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.50 RU14", "product": { "name": "LANCOM LCOS \u003c10.50 RU14", "product_id": "T035940", "product_identification_helper": { "cpe": "cpe:/o:lancom:lcos:10.50_ru14" } } }, { "category": "product_version_range", "name": "\u003c10.72 RU8", "product": { "name": "LANCOM LCOS \u003c10.72 RU8", "product_id": "T035941", "product_identification_helper": { "cpe": "cpe:/o:lancom:lcos:10.72_ru8" } } }, { "category": "product_version_range", "name": "\u003c10.80 RU6", "product": { "name": "LANCOM LCOS \u003c10.80 RU6", "product_id": "T035942", "product_identification_helper": { "cpe": "cpe:/o:lancom:lcos:10.80_ru6" } } }, { "category": "product_version_range", "name": "LX \u003c6.20", "product": { "name": "LANCOM LCOS LX \u003c6.20", "product_id": "T035945", "product_identification_helper": { "cpe": "cpe:/o:lancom:lcos:6.20::lx" } } }, { "category": "product_version_range", "name": "SX \u003c3.34 SU8", "product": { "name": "LANCOM LCOS SX \u003c3.34 SU8", "product_id": "T035947", "product_identification_helper": { "cpe": "cpe:/o:lancom:lcos:3.34:su8:sx" } } }, { "category": "product_version_range", "name": "SX \u003c4.00 SU13", "product": { "name": "LANCOM LCOS SX \u003c4.00 SU13", "product_id": "T035948", "product_identification_helper": { "cpe": "cpe:/o:lancom:lcos:4.00:su13:sx" } } }, { "category": "product_version_range", "name": "SX \u003c4.20 SU3", "product": { "name": "LANCOM LCOS SX \u003c4.20 SU3", "product_id": "T035949", "product_identification_helper": { "cpe": "cpe:/o:lancom:lcos:4.20:su3:sx" } } }, { "category": "product_version_range", "name": "SX \u003c4.30", "product": { "name": "LANCOM LCOS SX \u003c4.30", "product_id": "T035950", "product_identification_helper": { "cpe": "cpe:/o:lancom:lcos:4.30::sx" } } }, { "category": "product_version_range", "name": "SX \u003c5.20 SU9", "product": { "name": "LANCOM LCOS SX \u003c5.20 SU9", "product_id": "T035951", "product_identification_helper": { "cpe": "cpe:/o:lancom:lcos:5.20:su9:sx" } } } ], "category": "product_name", "name": "LCOS" }, { "category": "product_name", "name": "LANCOM Router", "product": { "name": "LANCOM Router", "product_id": "T019305", "product_identification_helper": { "cpe": "cpe:/h:lancom:router:-" } } }, { "category": "product_name", "name": "LANCOM Switch", "product": { "name": "LANCOM Switch", "product_id": "T035953", "product_identification_helper": { "cpe": "cpe:/h:lancom:switch:-" } } } ], "category": "vendor", "name": "LANCOM" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c3.0.27", "product": { "name": "Open Source FreeRADIUS \u003c3.0.27", "product_id": "T035938", "product_identification_helper": { "cpe": "cpe:/a:freeradius:freeradius:3.0.27" } } }, { "category": "product_version_range", "name": "\u003c3.2.5", "product": { "name": "Open Source FreeRADIUS \u003c3.2.5", "product_id": "T035939", "product_identification_helper": { "cpe": "cpe:/a:freeradius:freeradius:3.2.5" } } } ], "category": "product_name", "name": "FreeRADIUS" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c11.2", "product": { "name": "PaloAlto Networks PAN-OS \u003c11.2", "product_id": "T036074", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:11.2" } } }, { "category": "product_version_range", "name": "\u003c11.1.3", "product": { "name": "PaloAlto Networks PAN-OS \u003c11.1.3", "product_id": "T036075", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:11.1.3" } } }, { "category": "product_version_range", "name": "\u003c11.0.4-h4", "product": { "name": "PaloAlto Networks PAN-OS \u003c11.0.4-h4", "product_id": "T036076", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:11.0.4-h4" } } }, { "category": "product_version_range", "name": "\u003c10.2.10", "product": { "name": "PaloAlto Networks PAN-OS \u003c10.2.10", "product_id": "T036077", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:10.2.10" } } }, { "category": "product_version_range", "name": "\u003c10.1.14", "product": { "name": "PaloAlto Networks PAN-OS \u003c10.1.14", "product_id": "T036078", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:10.1.14" } } }, { "category": "product_version_range", "name": "\u003c9.1.19", "product": { "name": "PaloAlto Networks PAN-OS \u003c9.1.19", "product_id": "T036079", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:9.1.19" } } } ], "category": "product_name", "name": "PAN-OS" } ], "category": "vendor", "name": "PaloAlto Networks" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "SonicWall Global VPN Client", "product": { "name": "SonicWall Global VPN Client", "product_id": "829390", "product_identification_helper": { "cpe": "cpe:/a:sonicwall:global_vpn_client:-" } } } ], "category": "vendor", "name": "SonicWall" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-3596", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle im RADIUS Protokoll (RFC 2865). Diese erm\u00f6glicht es, jeden beliebigen Benutzer zur Authentifizierung zu zwingen und ihm eine beliebige Berechtigung (VLAN usw.) zu erteilen. Durch die \u00c4nderung bestimmter Access-Request-Meldungen kann ein lokaler Angreifer diese Schwachstelle ausnutzen, um einen Mallory-in-the-middle (MitM)-Angriff durchzuf\u00fchren oder um unter bestimmten Umst\u00e4nden Integrit\u00e4tspr\u00fcfungen zu umgehen." } ], "product_status": { "known_affected": [ "829390", "T035953", "T035952", "67646", "T016459", "T016458", "T021926", "1202977", "T035033", "T007902", "T036384", "1487015", "T019358", "T000612", "T021359", "T027755", "T029736", "T030538", "T001069", "1269011", "T003851", "T003258", "T009516", "T003853", "T007958", "T036076", "2062", "T034850", "T036077", "74185", "T036078", "T015770", "T036079", "T036074", "T036075", "T002207", "T019305", "T023403", "778219" ] }, "release_date": "2024-07-09T22:00:00Z", "title": "CVE-2024-3596" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.